mhasbini / dupruleLinks
Detect & filter duplicate hashcat rules
☆46Updated 8 months ago
Alternatives and similar repositories for duprule
Users that are interested in duprule are comparing it to the libraries listed below
Sorting:
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- Random Hashcat Scrips☆32Updated 11 months ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Updated 9 years ago
- ☆37Updated 4 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 10 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- Haschcat Rules processor☆14Updated 2 years ago
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- Content from THOTCON 0xa talk☆10Updated 6 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆65Updated last year
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated last month
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Updated 6 years ago
- Collection of hashcat lists and things.☆51Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆29Updated 2 months ago
- A new web frontend for Hashtopolis☆38Updated this week
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 9 months ago
- A CHaracter Aware Splitting Method for producing password candidates.☆42Updated 7 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Updated 4 years ago
- ☆38Updated 7 months ago
- ☆42Updated 9 years ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Machine-learn password mangling rules☆113Updated 2 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- ☆27Updated 5 years ago