Unique hashes.org "founds" sorted by occurrence. (November 2019)
☆87Nov 6, 2019Updated 6 years ago
Alternatives and similar repositories for hashes.org-list
Users that are interested in hashes.org-list are comparing it to the libraries listed below
Sorting:
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- large hashcat rulesets generated from real-world compromised passwords☆400Nov 26, 2020Updated 5 years ago
- Most common AWS S3 bucket names.☆29Jun 2, 2020Updated 5 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Feb 28, 2026Updated last week
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 27, 2026Updated last week
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated last week
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- A Vulnerablity Radar That Runs With GIthub Actions☆44Feb 27, 2026Updated last week
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- Do DFIR work in a Windows Sandbox☆20Feb 27, 2026Updated last week
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- VM for OSINT investigators that is a test-bed for using AI tools and agents to improve investigations. No out-of-date and unmaintained t…☆17May 2, 2025Updated 10 months ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- ☆37Sep 29, 2020Updated 5 years ago
- Implementation of the ciphers in iClass☆45Apr 6, 2023Updated 2 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago