rarecoil / hashes.org-list
Unique hashes.org "founds" sorted by occurrence. (November 2019)
☆75Updated 5 years ago
Alternatives and similar repositories for hashes.org-list:
Users that are interested in hashes.org-list are comparing it to the libraries listed below
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆32Updated 9 months ago
- hashgen - the blazingly fast hash generator☆32Updated last week
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆94Updated 4 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- Traps web spiders☆71Updated 4 years ago
- Team hashcat event writeups and tools☆48Updated 7 months ago
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- Various wordlists☆59Updated 3 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Repository containing useful links for all things Physical Security. Please contribute!☆88Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆146Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆80Updated 4 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆115Updated 2 weeks ago
- Collection of hashcat lists and things.☆48Updated 5 years ago
- ☆91Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆87Updated last year
- Automated rogue access point setup tool.☆195Updated 4 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Command line interface to interact with hashes.com escrow service.☆37Updated last week
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Detect & filter duplicate hashcat rules☆43Updated 3 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆33Updated 5 months ago
- Official python agent for using the distributed hashcracker Hashtopolis☆71Updated 3 weeks ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆95Updated last year
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆94Updated last year
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆106Updated 2 years ago