n0kovo / awesome-password-crackingView external linksLinks
A curated list of awesome tools, research, papers and other projects related to password cracking and password security.
☆849Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for awesome-password-cracking
Users that are interested in awesome-password-cracking are comparing it to the libraries listed below
Sorting:
- A curated list of security card games.☆156Jun 2, 2025Updated 8 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆139Jan 16, 2026Updated last month
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆245Dec 29, 2025Updated last month
- hashgen - the blazingly fast hash generator☆40Feb 10, 2026Updated last week
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆369Nov 22, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆955Nov 20, 2023Updated 2 years ago
- A curated list of awesome malware persistence tools and resources.☆272Oct 3, 2025Updated 4 months ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,254Mar 19, 2025Updated 10 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 2 months ago
- Real-world infosec wordlists, updated regularly☆1,632Updated this week
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Wordlists handcrafted (and automated) with ♥☆228Aug 1, 2025Updated 6 months ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,808Jun 28, 2022Updated 3 years ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,322Updated this week
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,083Jun 10, 2024Updated last year
- ☆119Oct 27, 2022Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆760Apr 4, 2023Updated 2 years ago
- Zero Infrastructure Password Cracking☆413Aug 22, 2024Updated last year
- Curating the best DevSecOps resources and tooling.☆1,625Aug 2, 2024Updated last year
- A curated list of awesome embedded and IoT security resources.☆2,222Oct 17, 2023Updated 2 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,734Aug 9, 2025Updated 6 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,298Jan 29, 2026Updated 2 weeks ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,799Feb 10, 2026Updated last week
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,174Jan 5, 2026Updated last month
- CrackerJack / Hashcat Web Interface / Context Information Security☆64Apr 24, 2025Updated 9 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 6 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆447Jan 25, 2024Updated 2 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆966Nov 4, 2025Updated 3 months ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,191Jan 25, 2026Updated 3 weeks ago
- A curated list of awesome Hacking tutorials, tools and resources☆15,685Jun 2, 2024Updated last year
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,078Apr 22, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆816Mar 31, 2024Updated last year
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆139Dec 17, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year