What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological dig to unearth these rare password species, plucked straight from Hashes.org uncracked hashes list. Imagine the wonders we will discover in their string's "DNA" that may help you in your next cracking adventure…
☆14Feb 19, 2019Updated 7 years ago
Alternatives and similar repositories for survivor-hashes
Users that are interested in survivor-hashes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Personal collection of Bitburner scripts☆21Nov 13, 2022Updated 3 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Feb 24, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆18Jul 3, 2020Updated 5 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆12Nov 24, 2025Updated 4 months ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 9 months ago
- Growatt Solar Inverter Modbus TCP integration for Home Assistant☆28Updated this week
- ESPHome component for reading/writing information to Broan ERVs via serial☆27Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 3 years ago
- An information screen using the NS API designed as a small Raspberry Pi web app☆10Feb 22, 2017Updated 9 years ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Aug 26, 2021Updated 4 years ago
- ☆18Oct 11, 2017Updated 8 years ago
- Just a simple tool to concurrently attack password-protected PKCS#12 (PFX/P12) files☆18Feb 27, 2025Updated last year
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- sner4 LEGACY repository, see https://github.com/snerstack/sner-monorepo for current versions☆13Aug 27, 2024Updated last year
- Cervantes plataform docker repository☆15Aug 6, 2025Updated 7 months ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 3 months ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆79Aug 4, 2025Updated 7 months ago
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆17Nov 13, 2025Updated 4 months ago
- blog implemented in flask with angular frontend☆14Oct 18, 2015Updated 10 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 9 months ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated 2 weeks ago
- A template library for fixed-point calculations☆16Oct 11, 2018Updated 7 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago