sean-t-smith / Extreme_Breach_MasksLinks
A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.
☆129Updated last year
Alternatives and similar repositories for Extreme_Breach_Masks
Users that are interested in Extreme_Breach_Masks are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- ☆99Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated 4 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Updated version of n0kovo's Rule List☆35Updated 3 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 9 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆167Updated 3 weeks ago
- Modular Enumeration and Password Spraying Framework☆122Updated last year
- Browser extension that extracts users from LinkedIn company pages☆160Updated 2 years ago
- Script to perform some hashcracking logic automagically☆73Updated last year
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Roast in the Middle☆292Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆202Updated 2 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆24Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 5 months ago
- My Password Cracking Methodology☆82Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆90Updated last week
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆177Updated last year
- Hiding GoPhish from the boys in blue☆192Updated 2 years ago
- ☆190Updated 2 years ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆147Updated 9 months ago
- An OSINT employee/username enumeration tool☆67Updated 7 months ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆110Updated 8 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆319Updated 3 months ago
- ☆30Updated 2 years ago