Hashtopolis - distributed password cracking with Hashcat
☆1,716Feb 20, 2026Updated last week
Alternatives and similar repositories for server
Users that are interested in server are comparing it to the libraries listed below
Sorting:
- Official python agent for using the distributed hashcracker Hashtopolis☆79Dec 23, 2025Updated 2 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,803Updated this week
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Queue and resource system for cracking passwords☆392Sep 22, 2022Updated 3 years ago
- A new web frontend for Hashtopolis☆41Feb 20, 2026Updated last week
- ☆25May 18, 2021Updated 4 years ago
- A hashcat-based distributed password cracking system☆169Jun 29, 2025Updated 8 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,465Sep 22, 2024Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- PACK (Password Analysis and Cracking Kit)☆867Dec 10, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆822Apr 6, 2024Updated last year
- NTLMv1 Multitool☆659Nov 30, 2025Updated 3 months ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆561Jan 3, 2017Updated 9 years ago
- Mimikatz implementation in pure Python☆3,249Jan 2, 2026Updated last month
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,642Oct 11, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,603Dec 9, 2021Updated 4 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,822Mar 17, 2021Updated 4 years ago
- Payload Generation Framework☆1,964Aug 21, 2024Updated last year
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,530Jul 15, 2019Updated 6 years ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,325Updated this week
- Wiki to collect Red Team infrastructure hardening resources☆4,448Oct 1, 2025Updated 4 months ago
- Small utilities that are useful in advanced password cracking☆1,551Nov 8, 2025Updated 3 months ago
- Run PowerShell command without invoking powershell.exe☆1,533Mar 23, 2023Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,620Jul 18, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,322Dec 6, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,353Jan 26, 2026Updated last month
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,219Oct 4, 2023Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 6 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,432Jan 13, 2026Updated last month
- A tool to abuse Exchange services☆2,300Jun 10, 2024Updated last year
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,556Oct 17, 2022Updated 3 years ago
- Extract credentials from lsass remotely☆2,178Dec 24, 2025Updated 2 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,142Oct 20, 2025Updated 4 months ago
- A Python based ingestor for BloodHound☆2,344Oct 24, 2025Updated 4 months ago
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago