sean-t-smith / Extreme_Breach_Masks
A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.
☆106Updated 9 months ago
Related projects: ⓘ
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆67Updated 3 weeks ago
- ☆57Updated last year
- Collection of hashcat lists and things.☆50Updated 4 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆77Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆95Updated 3 weeks ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆337Updated 5 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆29Updated 4 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆26Updated 2 months ago
- Script to perform some hashcracking logic automagically☆61Updated 4 months ago
- Generate graphs and charts based on password cracking result☆152Updated last year
- Password list generator for password spraying - prebaked with goodies☆93Updated last year
- msImpersonate - User account impersonation written in pure Python3☆106Updated 2 years ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆21Updated last week
- Hiding GoPhish from the boys in blue☆167Updated last year
- Rule for hashcat or john. Aiming to crack how people generate their password☆394Updated 2 weeks ago
- Team hashcat event writeups and tools☆42Updated last week
- Various wordlists☆51Updated 4 months ago
- Updated version of n0kovo's Rule List☆25Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆385Updated 3 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆186Updated 2 months ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆68Updated 4 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆89Updated last year
- My Password Cracking Methodology☆80Updated last year
- A toolkit for your red team operations☆17Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆45Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆143Updated 9 months ago
- Browser extension that extracts users from LinkedIn company pages☆151Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆63Updated 3 months ago
- ☆72Updated 6 months ago