What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 3 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Personal collection of Bitburner scripts☆21Nov 13, 2022Updated 3 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆101Feb 24, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆18Jul 3, 2020Updated 5 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆14Nov 24, 2025Updated 5 months ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Determine Who Can Log In to an SSH Server☆29Jun 27, 2025Updated 10 months ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 3 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Aug 26, 2021Updated 4 years ago
- ☆18Oct 11, 2017Updated 8 years ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆28Apr 29, 2026Updated last week
- Just a simple tool to concurrently attack password-protected PKCS#12 (PFX/P12) files☆18Feb 27, 2025Updated last year
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- Growatt Solar Inverter Modbus TCP integration for Home Assistant☆38Updated this week
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- sner4 LEGACY repository, see https://github.com/snerstack/sner-monorepo for current versions☆13Aug 27, 2024Updated last year
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 5 months ago
- Cervantes plataform docker repository☆16Aug 6, 2025Updated 9 months ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆79Aug 4, 2025Updated 9 months ago
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆19Nov 13, 2025Updated 5 months ago
- blog implemented in flask with angular frontend☆14Oct 18, 2015Updated 10 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Command line interface to interact with hashes.com escrow service.☆45Mar 12, 2026Updated last month
- A template library for fixed-point calculations☆16Oct 11, 2018Updated 7 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆38Apr 9, 2021Updated 5 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago