Markov-chains for linguistically-correct password cracking
☆63Mar 15, 2022Updated 4 years ago
Alternatives and similar repositories for rephraser
Users that are interested in rephraser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- ☆37Sep 29, 2020Updated 5 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 2 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Apr 9, 2026Updated last week
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated last month
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆37Nov 25, 2025Updated 4 months ago
- hashgen - the blazingly fast hash generator☆39Updated this week
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆95Jul 28, 2024Updated last year
- ☆18Mar 14, 2023Updated 3 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆138Dec 17, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 7 months ago
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Dec 25, 2015Updated 10 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Mar 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated last month
- This aims to be a collection of tools to forensically analyze Active Directory databases☆25Jun 11, 2025Updated 10 months ago
- ☆25Nov 2, 2021Updated 4 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,417Jul 13, 2025Updated 9 months ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- Enumerate and check domains for Azure tenants☆57Feb 1, 2022Updated 4 years ago
- An archive of descrypt hashes for common non-personal passwords☆46Jun 28, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Paper and Links to Crimeware in the Modern Era☆31Sep 5, 2019Updated 6 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 5 years ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 3 months ago