sean-t-smith / Extreme_Breach_MasksLinks
A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.
☆136Updated 2 years ago
Alternatives and similar repositories for Extreme_Breach_Masks
Users that are interested in Extreme_Breach_Masks are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆133Updated this week
- ☆118Updated 3 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated last week
- Updated version of n0kovo's Rule List☆43Updated 8 months ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆94Updated last year
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆182Updated 2 months ago
- Modular Enumeration and Password Spraying Framework☆128Updated last year
- Collection of hashcat lists and things.☆51Updated 6 years ago
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Updated 5 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- My Password Cracking Methodology☆83Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆121Updated 2 months ago
- ☆196Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated 3 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- Extract credentials and other useful info from network captures☆76Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated last month
- Roast in the Middle☆295Updated 4 months ago
- Browser extension that extracts users from LinkedIn company pages☆164Updated 2 years ago
- Hiding GoPhish from the boys in blue☆200Updated 3 years ago
- ☆101Updated 4 months ago
- large hashcat rulesets generated from real-world compromised passwords☆399Updated 5 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆27Updated 4 months ago
- A little utility to convert nmap xml results to markdown tables☆71Updated 3 years ago