n0kovo / hashcat-rules-collectionLinks
Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.
☆121Updated 10 months ago
Alternatives and similar repositories for hashcat-rules-collection
Users that are interested in hashcat-rules-collection are comparing it to the libraries listed below
Sorting:
- ☆111Updated 3 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆133Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated 11 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆96Updated 3 months ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆118Updated last week
- Updated version of n0kovo's Rule List☆38Updated 5 months ago
- Script to perform some hashcracking logic automagically☆76Updated 2 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆113Updated last week
- Extract credentials and other useful info from network captures☆72Updated 2 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆65Updated last year
- Password list generator for password spraying - prebaked with goodies☆106Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated last month
- Various wordlists☆68Updated 10 months ago
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- hashgen - the blazingly fast hash generator☆38Updated 3 weeks ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Custom rules by cyclone☆15Updated 3 months ago
- Collection of hashcat lists and things.☆52Updated 5 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Detect & filter duplicate hashcat rules☆47Updated 9 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆154Updated 8 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Team hashcat event writeups and tools☆51Updated 2 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆41Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated last month
- This project is aimed at freely providing technical guides on various hacking tools.☆119Updated last year
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆163Updated last year