World's fastest and most advanced password recovery utility
☆19Feb 16, 2025Updated last year
Alternatives and similar repositories for hashcat
Users that are interested in hashcat are comparing it to the libraries listed below
Sorting:
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- ☆38Nov 9, 2025Updated 4 months ago
- Flash your ESP32 quickly and easily.☆36Mar 4, 2026Updated 2 weeks ago
- 学习使我快乐!☆14Updated this week
- ☆62Jan 22, 2026Updated last month
- ☆31Aug 13, 2025Updated 7 months ago
- Source files and writeups for the brixel CTF 2020☆10Jan 1, 2021Updated 5 years ago
- Personal "King of The Hill" toolkit.☆12Nov 5, 2024Updated last year
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- ☆16Apr 10, 2024Updated last year
- Ultra fast hashcracking tool written in Python3☆12Mar 28, 2021Updated 4 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- ☆17Jun 21, 2024Updated last year
- CISOfy Handbook☆35Sep 15, 2016Updated 9 years ago
- A basic Bug Bounty target monitoring tool based on Discord Bot☆23Jan 30, 2025Updated last year
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆32Jan 11, 2025Updated last year
- a safedog fuzzing python script☆18Apr 15, 2018Updated 7 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- ☆14Mar 16, 2024Updated 2 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆49Jan 31, 2026Updated last month
- Audio steganography web app☆18Mar 16, 2020Updated 6 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50May 21, 2024Updated last year
- A post-exploitation tool to decrypt SolarPutty's sessions files☆37Dec 8, 2022Updated 3 years ago
- Cracks Android Screenlock Gesture Pattern using dictionary Attack☆21Jan 5, 2016Updated 10 years ago
- BRICS+ CTF 2024 Quals☆22Oct 6, 2024Updated last year
- Repository to save all write-ups from UAM challenges☆29Sep 23, 2020Updated 5 years ago
- Useful OSINT tools for Discord☆23Jan 21, 2026Updated last month
- command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searchi…☆42Aug 5, 2025Updated 7 months ago
- A local privilege escalation vulnerability in VMware vCenter Server (and VMware Cloud Foundation) caused by a misconfiguration of sudo, a…☆57Jul 9, 2024Updated last year
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- ☆46Mar 13, 2025Updated last year
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago