A Python implementation of Crackstion's Hash Lookup
☆26Jul 4, 2020Updated 5 years ago
Alternatives and similar repositories for hashlookup
Users that are interested in hashlookup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- go-glmatrix is a golang version of glMatrix, which is "designed to perform vector and matrix operations stupidly fast".☆11Feb 5, 2021Updated 5 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- ☆21Apr 2, 2024Updated last year
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- ☆12Feb 20, 2021Updated 5 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- ☆13Jun 14, 2023Updated 2 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Tools to recover, extract and decrypt metamask wallets☆25Mar 12, 2026Updated 2 weeks ago
- Example signature files for drek.☆12Jan 10, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Nov 19, 2016Updated 9 years ago
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆17Aug 21, 2024Updated last year
- A regular expression to SMT-LIB constraint translator☆12Jul 12, 2025Updated 8 months ago
- Cheat Sheets of the tools/programming languages☆12Jul 8, 2018Updated 7 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- (Unofficial) Python API for http://netcraft.com☆15Jul 6, 2016Updated 9 years ago
- ☆19Jan 19, 2026Updated 2 months ago
- Angr-based static analysis tool for vusec/vuzzer64 fuzzing tool☆22Aug 3, 2020Updated 5 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- A service which recognizes sequences of hand gestures tracked by the Leap Motion Controller and triggers keyboard events based on a custo…☆13Jun 9, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a collection of my dotfiles for Mac OS X.☆19Mar 27, 2024Updated 2 years ago
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆14Sep 6, 2022Updated 3 years ago
- Totally not inspired by crackmapexec. It's a learning project and aims to expose modules useful for AD tools☆13Nov 7, 2024Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- ☆15Jul 25, 2019Updated 6 years ago