Web-app to identify the different types of hashes
☆20Aug 26, 2023Updated 2 years ago
Alternatives and similar repositories for hashID
Users that are interested in hashID are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yescrypt Hash Cracker☆16Jan 13, 2026Updated 4 months ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 5 months ago
- bash-based certificate authority, with CA-cert, signing-cert, and revocation support.☆10Oct 8, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts by cyclone to automate tasks☆24Dec 12, 2025Updated 5 months ago
- A simple script for plotting the flight path of aircraft from ADS-B packet data☆12Jan 25, 2018Updated 8 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 8 months ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- ☆12Nov 26, 2025Updated 5 months ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 3 years ago
- hashgen - the blazingly fast hash generator☆40May 12, 2026Updated last week
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- API tool for hashes.com escrow☆12May 2, 2026Updated 2 weeks ago
- Cracking PDF password protection via hashcat.☆16Updated this week
- PowerShell version of Fail2Ban☆14Oct 10, 2019Updated 6 years ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 7 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Tools to recover, extract and decrypt Phantom wallets☆32May 12, 2026Updated last week
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Yara rules for detecting malware☆23Sep 9, 2025Updated 8 months ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 6 years ago
- Unserializes any binary|text|file|memory plist data and returns a usable Python dict☆14Jun 11, 2025Updated 11 months ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- Blackbird OSINT tool FrontEnd React Project☆13Mar 6, 2024Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Minimalist Xargs for Windows☆10Dec 5, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Various test fonts (OpenType, OpenType with TrueType GX variation extensions, Multiple Master) for testing implementations of font format…☆11Jun 25, 2025Updated 10 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 5 months ago
- ☆15Feb 29, 2024Updated 2 years ago
- ☆20Oct 2, 2024Updated last year
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year