Frontend for hashcat with integration of hashes.com escrow services.
☆59Updated this week
Alternatives and similar repositories for Hashcat-Reactor
Users that are interested in Hashcat-Reactor are comparing it to the libraries listed below
Sorting:
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 2 months ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆13Nov 19, 2025Updated 3 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Wrapper for concurrent batch processing of testssl.sh commands☆13Mar 15, 2019Updated 6 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- Send Emails using Bash in Synology☆12Jul 1, 2023Updated 2 years ago
- A github workflow that automatically commits a random joke in the README file when someone stars this repository.☆11Aug 21, 2025Updated 6 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- ChessDragon136's Unoficcial MediaBrowser 3 client for Samsung TV's☆10Dec 24, 2015Updated 10 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- Cracking PDF password protection via hashcat.☆14Dec 24, 2025Updated 2 months ago
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- Practice interview problems solved in Rust☆13Jan 28, 2021Updated 5 years ago
- Add context menu to quickly open things with Sublime Text☆11Feb 22, 2020Updated 6 years ago
- ☆120Oct 27, 2022Updated 3 years ago
- A plugin for the PS3 Media Server which allows you to browse and listen SoundCloud on your PS3☆26Oct 31, 2010Updated 15 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- ☆11Feb 17, 2025Updated last year
- ☆15Dec 4, 2023Updated 2 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- ☆17Sep 17, 2020Updated 5 years ago