Automated password cracking with AWS GPU instances and CUDA hashcat
☆51Mar 9, 2015Updated 11 years ago
Alternatives and similar repositories for aws-cudahashcat-auto
Users that are interested in aws-cudahashcat-auto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Hashcat Bash Scripts for bulk hash file processing☆52Jul 2, 2016Updated 9 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- Password Cracking in the Cloud☆24Dec 18, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Custom password cracking rules for Hashcat and John the Ripper☆94Aug 19, 2024Updated last year
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last week
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Analyze and modify hashcat .restore files☆34Nov 19, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Selenium based web scraper to generate passwords list☆51May 7, 2020Updated 5 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- A tool that converts Bitwarden's data into a hashcat-suitable hash☆25Mar 17, 2022Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last month
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A collection of tools for debugging Windows application crashes.☆18Nov 24, 2022Updated 3 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Aug 8, 2015Updated 10 years ago
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- ☆26Dec 8, 2025Updated 4 months ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Jun 27, 2018Updated 7 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆77Oct 22, 2016Updated 9 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- SNES for MiSTer☆16Sep 5, 2025Updated 7 months ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆65Nov 5, 2015Updated 10 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago