Web-app to identify the different types of hashes
☆20Aug 26, 2023Updated 2 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated last month
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 4 months ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 4 months ago
- hashgen - the blazingly fast hash generator☆39Apr 14, 2026Updated 2 weeks ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Cracking PDF password protection via hashcat.☆16Dec 24, 2025Updated 4 months ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Printable version of great set of regex tips from www.rexegg.com☆21Nov 1, 2017Updated 8 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Unserializes any binary|text|file|memory plist data and returns a usable Python dict☆14Jun 11, 2025Updated 10 months ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- qobuz downloader web extension☆24Feb 15, 2026Updated 2 months ago
- A collection of purposefully bad user interface implementations☆15Aug 26, 2023Updated 2 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 3 months ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 4 months ago
- ☆29Oct 8, 2019Updated 6 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago