matrix / hashcatLinks
World's fastest and most advanced GPGPU-based password recovery utility
☆30Updated this week
Alternatives and similar repositories for hashcat
Users that are interested in hashcat are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- A pentesting Firefox spy extension - PoC☆10Updated 9 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- wh cyberspace☆12Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- A lightweight ducky script generator written in python.☆30Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- Simple Google Chrome stealer, sends passwords via Telegram into private channel☆47Updated 7 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Session scripts.☆49Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Modern Javascript keylogger with web panel☆23Updated 5 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Updated last year
- New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point locat…☆17Updated 4 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Updated 4 years ago
- Anubis 7.0☆27Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆30Updated 7 years ago
- Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
- Public exploits☆15Updated 7 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- Script to facilitate different functions and checks☆44Updated 3 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Updated 10 years ago
- ☆53Updated 4 years ago
- CVE-2020-0601 #curveball - Alternative Key Calculator☆78Updated 5 years ago