yanncam / multiduplicutView external linksLinks
multiduplicut : optimize wordlists-based password cracking methods chaining
☆16Feb 25, 2022Updated 3 years ago
Alternatives and similar repositories for multiduplicut
Users that are interested in multiduplicut are comparing it to the libraries listed below
Sorting:
- ☆18Mar 14, 2023Updated 2 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- ☆12Feb 24, 2023Updated 2 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆26Mar 31, 2025Updated 10 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Dec 30, 2025Updated last month
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228☆17Dec 15, 2021Updated 4 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 3 years ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆26Jun 11, 2025Updated 8 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆25Oct 6, 2024Updated last year
- Exercises Galois theory D. Cox☆12Jun 29, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 2 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Apr 1, 2022Updated 3 years ago
- ☆65Jan 17, 2026Updated 3 weeks ago
- ☆23Jun 1, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Jul 22, 2025Updated 6 months ago