pantagrule

Hash rule set

A collection of optimized hashcat rules generated from real-world password compromise data.

large hashcat rulesets generated from real-world compromised passwords

GitHub

390 stars
11 watching
55 forks
last commit: almost 4 years ago
Linked from 1 awesome list

hashcathashcat-rulespassword-crackingpasswordssecurity-research

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
clem9669/hashcat-rule Provides pre-defined rules for cracking password hashes with hashcat and john. 405
n0kovo/hashcat-rules-collection A collection of pre-defined rules for password cracking and wordlist processing using the Hashcat tool 77
stealthsploit/oneruletorulethemstill A revamped and optimized hash cracking rule designed to improve efficiency while maintaining performance 388
nsakey/nsa-rules A collection of pre-defined rules and masks for password cracking using hashcat. 528
xfox64x/hashcat-stuffs A collection of tools and scripts designed to aid in password cracking using the Hashcat software 50
nyxgeek/nyxgeek-rules Custom password cracking rules for Hashcat and John the Ripper 77
0xvavaldi/ruleprocessory Tool to process and transform wordlists by applying complex rules for password cracking 30
trustedsec/hate_crack Automates password cracking using hashcat 1,662
hashcat/hashcat-utils A collection of standalone utilities for password cracking and hashing 1,365
brannondorsey/naive-hashcat A script that cracks password hashes without requiring extensive configuration. 1,236
hashtopolis/server A tool for distributing hashcat tasks to multiple computers 1,457
corkami/pocs Research and experimentation with potential vulnerabilities in data hashing algorithms. 1,475
samebchase/hash-set An implementation of a data structure providing constant time lookup and insertion operations. 17
notsosecure/password_cracking_rules A collection of password cracking rules combining various rule sets to provide a comprehensive attack strategy 1,476
bungle/lua-resty-scrypt A Lua-based library implementing the scrypt password hashing algorithm 18