netmux / survivor-hashesLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆34Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- ☆16Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Random Hashcat Scrips☆32Updated 11 months ago
- ☆36Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- Ansible scripts to build an attack box☆23Updated 7 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago