What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 8 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 3 months ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 2 years ago
- Study and research with your docs, media, and AI in one place☆33Mar 2, 2026Updated last week
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- This tool emulates the modbus registers of a SDM630 (Single/Three Phase Power Meter) from Eastron (pymodbus, Raspberry). Useful for Growa…☆11May 17, 2025Updated 9 months ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆79Aug 4, 2025Updated 7 months ago
- ☆13Nov 5, 2024Updated last year
- ESPHome component for reading/writing information to Broan ERVs via serial☆25Jan 8, 2026Updated 2 months ago
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆16Nov 13, 2025Updated 3 months ago
- CSV exporter user script for icscards.nl☆14Jan 14, 2026Updated last month
- Home Assistant Integration for Enode☆14Nov 29, 2025Updated 3 months ago
- ☆38Oct 12, 2020Updated 5 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- This script will convert excel spreadsheets in the format of the examples included in this repository.☆12Aug 13, 2020Updated 5 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- This verified Homebridge plugin exposes your HomeWizard Energy Sockets to Apple HomeKit. So you can use the Home App to switch your Energ…☆11Mar 26, 2025Updated 11 months ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 3 months ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- ☆17Feb 9, 2026Updated 3 weeks ago
- ☆16May 13, 2021Updated 4 years ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- Android backdoored app, improved source code of msfvenom android .apk☆10Mar 31, 2023Updated 2 years ago