hops / pack2
☆33Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for pack2
- Detect & filter duplicate hashcat rules☆41Updated 2 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆19Updated this week
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆30Updated last week
- hashgen - the blazingly fast hash generator☆24Updated this week
- Machine-learn password mangling rules☆109Updated last year
- My rules☆15Updated this week
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- Haschcat Rules processor☆13Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆20Updated 10 months ago
- A new web frontend for Hashtopolis☆25Updated this week
- wordlists for password cracking☆25Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- Random Hashcat Scrips☆22Updated 3 weeks ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆81Updated last year
- async parser for JET☆21Updated 9 months ago
- Distillations and expansions on Rocktastic12a☆13Updated 2 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆16Updated 9 months ago
- Script to perform some hashcracking logic automagically☆62Updated 5 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- URL Spider - web crawler and wordlist / ngram generator☆11Updated 4 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- Updated version of n0kovo's Rule List☆24Updated last year
- FETCH THE PASSWORD STRETCHER☆33Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆28Updated 4 months ago
- Rust-based password mutator for brute force attacks☆13Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆16Updated 5 years ago