nsa-rules

Password cracking tools

A collection of pre-defined rules and masks for password cracking using hashcat.

Password cracking rules and masks for hashcat that I generated from cracked passwords.

GitHub

528 stars
29 watching
125 forks
Language: Shell
last commit: almost 8 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
n0kovo/hashcat-rules-collection A collection of pre-defined rules for password cracking and wordlist processing using the Hashcat tool 77
clem9669/hashcat-rule Provides pre-defined rules for cracking password hashes with hashcat and john. 405
xfox64x/hashcat-stuffs A collection of tools and scripts designed to aid in password cracking using the Hashcat software 50
notsosecure/password_cracking_rules A collection of password cracking rules combining various rule sets to provide a comprehensive attack strategy 1,476
hashcat/hashcat-utils A collection of standalone utilities for password cracking and hashing 1,365
trustedsec/hate_crack Automates password cracking using hashcat 1,662
nyxgeek/nyxgeek-rules Custom password cracking rules for Hashcat and John the Ripper 77
timbo05sec/autocrack Automates cracking of hashed passwords using Hashcat with customizable rules and wordlists 108
hegusung/webhashcat A web-based password cracking tool that facilitates distributed cracking sessions and provides analytics capabilities. 291
brannondorsey/naive-hashcat A script that cracks password hashes without requiring extensive configuration. 1,236
jakewnuk/ptt A versatile utility designed to facilitate password cracking by applying custom rules and transformations to input data 21
ctxis/crackerjack A web interface for password cracking tool Hashcat 357
rarecoil/pantagrule A collection of optimized hashcat rules generated from real-world password compromise data. 390
stormfleet/cloudcat Automates cloud-based password cracking infrastructure creation and management 16
scipag/password-list Provides a collection of leaked passwords compiled into ordered lists for analysis and use in security testing 319