Frontend for hashcat with integration of hashes.com escrow services.
☆62Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for Hashcat-Reactor
Users that are interested in Hashcat-Reactor are comparing it to the libraries listed below
Sorting:
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 3 months ago
- Pwnagothi recreation for M5Stack devices☆117Mar 8, 2026Updated last week
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- hashgen - the blazingly fast hash generator☆40Mar 12, 2026Updated last week
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- Reports in .MD format☆21Jul 8, 2025Updated 8 months ago
- Send Emails using Bash in Synology☆12Jul 1, 2023Updated 2 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 2 months ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- ☆32Oct 11, 2025Updated 5 months ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- ☆12Feb 19, 2025Updated last year
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Repo of General Conference addresses☆11Oct 9, 2025Updated 5 months ago
- ☆121Oct 27, 2022Updated 3 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆16Apr 15, 2021Updated 4 years ago
- Lastest Hashcat rules for password cracking☆69Feb 7, 2026Updated last month
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- ☆16Jun 15, 2025Updated 9 months ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Cookie Banner Plugin for Grav CMS with extended Admin Panel Manager and Cookie Settings options. Banner based on Cookie Consent JavaScrip…☆13Nov 14, 2024Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Custom hashcat kernel for new Metamask Vaults☆19Dec 12, 2025Updated 3 months ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆142Jan 16, 2026Updated 2 months ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- An omni-repo for deploying all TeXlyre servers☆46Jan 14, 2026Updated 2 months ago
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆32Aug 27, 2019Updated 6 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 3 months ago