sean-t-smith / Extreme_Breach_Masks
A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.
☆117Updated last year
Alternatives and similar repositories for Extreme_Breach_Masks:
Users that are interested in Extreme_Breach_Masks are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆85Updated last month
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆110Updated last month
- Collection of hashcat lists and things.☆50Updated 5 years ago
- ☆83Updated 2 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆428Updated 3 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆83Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆393Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆100Updated last year
- Generate graphs and charts based on password cracking result☆156Updated last year
- Roast in the Middle☆287Updated 2 months ago
- Modular Enumeration and Password Spraying Framework☆114Updated 9 months ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆57Updated 6 months ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆150Updated last week
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆31Updated 2 months ago
- My Password Cracking Methodology☆80Updated last year
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆116Updated 3 months ago
- Make everyone in your VLAN ASRep roastable☆168Updated this week
- Hiding GoPhish from the boys in blue☆174Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆184Updated 4 years ago
- Browser extension that extracts users from LinkedIn company pages☆156Updated last year
- ☆186Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆29Updated 7 months ago
- A public, open source physical security methodology☆44Updated 9 months ago
- Password spraying tool and Bloodhound integration☆219Updated 3 weeks ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆92Updated 2 months ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆425Updated 4 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆315Updated 3 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆192Updated 4 months ago
- This is the repository which is synced to the gitbook wiki at https://www.netexec.wiki/☆38Updated last week