n0kovo / hashcat-rules-collection
Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.
☆84Updated last month
Alternatives and similar repositories for hashcat-rules-collection:
Users that are interested in hashcat-rules-collection are comparing it to the libraries listed below
- ☆82Updated 2 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆31Updated 2 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆115Updated last year
- Various wordlists☆58Updated 3 weeks ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆29Updated 6 months ago
- Script to perform some hashcracking logic automagically☆67Updated 8 months ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆108Updated 3 weeks ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆83Updated last year
- Collection of extra pentest tools for Kali Linux☆99Updated last year
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆92Updated last month
- Updated version of n0kovo's Rule List☆25Updated 2 months ago
- Generate graphs and charts based on password cracking result☆155Updated last year
- Collection of hashcat lists and things.☆50Updated 5 years ago
- Password list generator for password spraying - prebaked with goodies☆100Updated last year
- Custom rules by cyclone☆12Updated last month
- ☆71Updated 8 months ago
- PACU - Phishing Automation & Campaigning Utility☆40Updated 2 years ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆35Updated this week
- Windows priviledge escalation script☆13Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆66Updated last year
- hashgen - the blazingly fast hash generator☆27Updated last month
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆67Updated 3 months ago
- sturdy-chainsaw☆52Updated last year
- Creating a Malicious Macro using MS Word☆18Updated 2 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆95Updated 5 months ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- ☆34Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 6 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 6 months ago