Free and open-source software to generate and use rainbow tables.
☆104Jun 6, 2024Updated last year
Alternatives and similar repositories for RainbowCrack-NG
Users that are interested in RainbowCrack-NG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆223Aug 4, 2021Updated 4 years ago
- Decipher hashes using online rainbow & lookup table attack services.☆155Jan 5, 2023Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- ☆28May 8, 2023Updated 2 years ago
- 🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.☆234Jan 5, 2023Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Jun 8, 2020Updated 5 years ago
- Python for Scientific Computing on Intel's Xeon Phi MIC Platform☆25Feb 1, 2014Updated 12 years ago
- ☆18Sep 14, 2021Updated 4 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- HashExpoit is Great Tool For Cracking Hash☆28Jul 15, 2020Updated 5 years ago
- GCC 5.1.1 cross-compiler for Intel Xeon Phi Knights Corner / k1om☆23Mar 29, 2016Updated 9 years ago
- Hierarchical Deterministic Wallet tools based on BIP0032☆18Apr 20, 2022Updated 3 years ago
- Link SV☆18Jan 21, 2023Updated 3 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- FPE - Format Preserving Encryption with FF3 in C☆14Jan 26, 2026Updated last month
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- A distributed algorithm applied to the bitcoin blockchain that allows to create a new representation of the transaction - a clusterized g…☆10Feb 28, 2019Updated 7 years ago
- The nosh toolset☆18Jul 31, 2025Updated 7 months ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- Simple validator for identification numbers based on Luhn algorithm☆14Jan 8, 2026Updated 2 months ago
- Use keyboard shortcuts to control brightness of the display on which your cursor is present☆21Aug 13, 2024Updated last year
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago
- A program to find the real string for your hash. MD5, SHA256, any really. Works really fast, gets to the "aaaa" combo in about 1 second e…☆18Jun 5, 2021Updated 4 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- ☆12Dec 31, 2020Updated 5 years ago
- Web service to receive SMS online anonymously.☆12May 21, 2017Updated 8 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 10 months ago
- 👨💻 • Install common developer tools in one command.☆17Jun 23, 2024Updated last year
- NVM user-space Primitives API library repository☆18Mar 12, 2014Updated 12 years ago
- Gets GPS location of phone numbers☆18Nov 19, 2025Updated 4 months ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- Calibrate multiple rtl-sdr dongles concurrently and make them work together on GSM☆44Oct 24, 2014Updated 11 years ago
- Specifications description for e-cat protocol☆17Oct 17, 2019Updated 6 years ago
- Android Port of Titan: A Highly Scalable, Distributed Graph Database☆20Dec 4, 2013Updated 12 years ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago