Automated password cracking with AWS GPU instances and CUDA hashcat
☆51Mar 9, 2015Updated 11 years ago
Alternatives and similar repositories for aws-cudahashcat-auto
Users that are interested in aws-cudahashcat-auto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Hashcat Bash Scripts for bulk hash file processing☆51Jul 2, 2016Updated 9 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- Password Cracking in the Cloud☆24Dec 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Custom password cracking rules for Hashcat and John the Ripper☆95Aug 19, 2024Updated last year
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- An RF stack for building exfiltration systems.☆17Oct 24, 2018Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Nov 25, 2019Updated 6 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- ☆21Aug 7, 2021Updated 4 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A collection of tools for debugging Windows application crashes.☆19Nov 24, 2022Updated 3 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- A twitter streaming, website-scraping, websocket-transporting news delivery webapp written in Go☆10Jul 17, 2015Updated 10 years ago
- Scalable user load testing tool written in Python and gevent☆19Dec 2, 2020Updated 5 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- ☆26Dec 8, 2025Updated 4 months ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆78Oct 22, 2016Updated 9 years ago
- convert specific strace output file to pcap using scapy☆24Mar 24, 2026Updated last month
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago