A stand-alone implementation of Hashcat's rule engine
☆35Sep 16, 2016Updated 9 years ago
Alternatives and similar repositories for HashcatRulesEngine
Users that are interested in HashcatRulesEngine are comparing it to the libraries listed below
Sorting:
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- ☆31Nov 22, 2021Updated 4 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆94Aug 19, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- Word-generator based on per-position markov-chains☆186Oct 27, 2023Updated 2 years ago
- Analyze and modify hashcat .restore files☆33Nov 19, 2022Updated 3 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Tools to recover, extract and decrypt Phantom wallets☆30Mar 12, 2026Updated last week
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- ☆25Jun 15, 2025Updated 9 months ago
- Extension blocks as found in ShellBags and other places in the Registry☆25Jan 7, 2025Updated last year
- Blogging system in Modern Perl☆11Jan 3, 2019Updated 7 years ago
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Feb 10, 2017Updated 9 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Aug 18, 2021Updated 4 years ago
- Custom hashcat kernel for new Metamask Vaults☆19Dec 12, 2025Updated 3 months ago
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 6 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Feb 28, 2026Updated 2 weeks ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 3 months ago
- Standalone password candidate generator using the PRINCE algorithm☆480Oct 30, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago