xfox64x / Hashcat-StuffsLinks
Collection of hashcat lists and things.
☆52Updated 5 years ago
Alternatives and similar repositories for Hashcat-Stuffs
Users that are interested in Hashcat-Stuffs are comparing it to the libraries listed below
Sorting:
- Script to perform some hashcracking logic automagically☆78Updated last week
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆133Updated last year
- ☆42Updated last year
- ☆141Updated 2 years ago
- Rewriting SIET to python3☆54Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated 2 months ago
- Generate graphs and charts based on password cracking result☆164Updated 2 years ago
- Top hashpwn rules☆21Updated 11 months ago
- Detect & filter duplicate hashcat rules☆47Updated 10 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 4 years ago
- ☆42Updated 4 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated last year
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆24Updated last year
- A swiss army knife for pentesting networks☆26Updated 3 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- ☆37Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- Extract credentials and other useful info from network captures☆72Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆143Updated 3 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 3 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆15Updated last year
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Diana Credential Recovery Framework☆63Updated last month
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago