a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
☆368Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for cracken
Users that are interested in cracken are comparing it to the libraries listed below
Sorting:
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆485Sep 24, 2025Updated 5 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,327Updated this week
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆965Nov 4, 2025Updated 4 months ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated last week
- rcat☆74Mar 7, 2022Updated 4 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,259Mar 19, 2025Updated 11 months ago
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- Wordlists handcrafted (and automated) with ♥☆230Aug 1, 2025Updated 7 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,199Jan 5, 2026Updated 2 months ago
- ☆224Oct 22, 2023Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆932Nov 11, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 5 months ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- ☆307Mar 15, 2025Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆159Feb 11, 2025Updated last year
- ☆46Mar 20, 2021Updated 4 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- A small reverse shell for Linux & Windows☆620Jun 5, 2024Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,056Oct 14, 2025Updated 4 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- ☆1,674Apr 14, 2025Updated 10 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆412Mar 21, 2025Updated 11 months ago
- The swiss army knife of LSASS dumping☆2,071Sep 17, 2024Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,447Dec 18, 2022Updated 3 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆459Sep 2, 2024Updated last year
- CrackerJack / Hashcat Web Interface / Context Information Security☆380Feb 1, 2024Updated 2 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190May 26, 2020Updated 5 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago