nsa-rules
Password cracking tools
A collection of pre-defined rules and masks for password cracking using hashcat.
Password cracking rules and masks for hashcat that I generated from cracked passwords.
530 stars
29 watching
125 forks
Language: Shell
last commit: about 8 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
n0kovo/hashcat-rules-collection | A collection of pre-defined rules for password cracking and wordlist processing using the Hashcat tool | 81 |
clem9669/hashcat-rule | Provides pre-defined rules for cracking password hashes with hashcat and john. | 420 |
xfox64x/hashcat-stuffs | A collection of tools and scripts designed to aid in password cracking using the Hashcat software | 50 |
notsosecure/password_cracking_rules | A collection of password cracking rules combining various rule sets to provide a comprehensive attack strategy | 1,489 |
hashcat/hashcat-utils | A collection of standalone utilities for password cracking and hashing | 1,382 |
trustedsec/hate_crack | Automates password cracking using hashcat | 1,675 |
nyxgeek/nyxgeek-rules | Custom password cracking rules for Hashcat and John the Ripper | 78 |
timbo05sec/autocrack | Automates cracking of hashed passwords using Hashcat with customizable rules and wordlists | 108 |
hegusung/webhashcat | A web-based password cracking tool that facilitates distributed cracking sessions and provides analytics capabilities. | 292 |
brannondorsey/naive-hashcat | A script that cracks password hashes without requiring extensive configuration. | 1,249 |
jakewnuk/ptt | A tool for transforming and cracking passwords using various techniques and rules. | 27 |
ctxis/crackerjack | A web interface for password cracking tool Hashcat | 358 |
rarecoil/pantagrule | A collection of optimized hashcat rules generated from real-world password compromise data. | 391 |
stormfleet/cloudcat | Automates cloud-based password cracking infrastructure creation and management | 17 |
scipag/password-list | Provides a collection of leaked passwords compiled into ordered lists for analysis and use in security testing | 326 |