netmux / survivor-hashesView external linksLinks
What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Feb 19, 2019Updated 6 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below
Sorting:
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆16Feb 5, 2026Updated last week
- ☆18Jul 3, 2020Updated 5 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 7 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ESPHome component for reading/writing information to Broan ERVs via serial☆24Jan 8, 2026Updated last month
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 2 months ago
- Rethinking the User Interface of AI☆28Updated this week
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆78Aug 4, 2025Updated 6 months ago
- ☆13Nov 5, 2024Updated last year
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆16Nov 13, 2025Updated 3 months ago
- CSV exporter user script for icscards.nl☆14Jan 14, 2026Updated last month
- This tool emulates the modbus registers of a SDM630 (Single/Three Phase Power Meter) from Eastron (pymodbus, Raspberry). Useful for Growa…☆11May 17, 2025Updated 8 months ago
- ☆38Oct 12, 2020Updated 5 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆10Dec 25, 2020Updated 5 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- This verified Homebridge plugin exposes your HomeWizard Energy Sockets to Apple HomeKit. So you can use the Home App to switch your Energ…☆11Mar 26, 2025Updated 10 months ago
- Home Assistant Custom Component: MijnKia Connected Services☆10Jul 6, 2024Updated last year
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated last year
- This repo is meant to contain various resources you need to learn new things!☆18Jul 28, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- This script will convert excel spreadsheets in the format of the examples included in this repository.☆12Aug 13, 2020Updated 5 years ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 2 months ago
- Android backdoored app, improved source code of msfvenom android .apk☆10Mar 31, 2023Updated 2 years ago
- ☆15Updated this week
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 8 months ago