What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 2 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Personal collection of Bitburner scripts☆21Nov 13, 2022Updated 3 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Feb 24, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆18Jul 3, 2020Updated 5 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆13Nov 24, 2025Updated 4 months ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 9 months ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆27Mar 27, 2026Updated 3 weeks ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- An information screen using the NS API designed as a small Raspberry Pi web app☆10Feb 22, 2017Updated 9 years ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 3 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Aug 26, 2021Updated 4 years ago
- ☆18Oct 11, 2017Updated 8 years ago
- Just a simple tool to concurrently attack password-protected PKCS#12 (PFX/P12) files☆18Feb 27, 2025Updated last year
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- Growatt Solar Inverter Modbus TCP integration for Home Assistant☆34Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- sner4 LEGACY repository, see https://github.com/snerstack/sner-monorepo for current versions☆13Aug 27, 2024Updated last year
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 4 months ago
- Cervantes plataform docker repository☆16Aug 6, 2025Updated 8 months ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆79Aug 4, 2025Updated 8 months ago
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆20Nov 13, 2025Updated 5 months ago
- blog implemented in flask with angular frontend☆14Oct 18, 2015Updated 10 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 10 months ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated last month
- A template library for fixed-point calculations☆16Oct 11, 2018Updated 7 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆38Apr 9, 2021Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago