sean-t-smith / Extreme_Breach_Masks
A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.
☆111Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Extreme_Breach_Masks
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆78Updated 3 months ago
- ☆75Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆81Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆103Updated this week
- Collection of hashcat lists and things.☆50Updated 4 years ago
- Script to perform some hashcracking logic automagically☆66Updated 6 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆28Updated 4 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆392Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆30Updated 3 weeks ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆64Updated last month
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆88Updated 3 weeks ago
- Generate graphs and charts based on password cracking result☆154Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆328Updated 4 months ago
- Password list generator for password spraying - prebaked with goodies☆94Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆147Updated last month
- Updated version of n0kovo's Rule List☆24Updated 2 weeks ago
- Various wordlists☆52Updated 6 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆158Updated 5 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆92Updated 3 months ago
- Browser extension that extracts users from LinkedIn company pages☆155Updated last year
- PACU - Phishing Automation & Campaigning Utility☆39Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆109Updated 7 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆68Updated 2 years ago
- Hiding GoPhish from the boys in blue☆173Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- Rule for hashcat or john. Aiming to crack how people generate their password☆406Updated 2 months ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆30Updated this week
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- A public, open source physical security methodology☆43Updated 7 months ago
- ☆72Updated 8 months ago