update lists
This commit is contained in:
@@ -59,7 +59,6 @@ an issue</a></li>
|
||||
<li><a href="#specific-file-formats">Specific file formats</a>
|
||||
<ul>
|
||||
<li><a href="#pdf">PDF</a></li>
|
||||
<li><a href="#pem">PEM</a></li>
|
||||
<li><a href="#jks">JKS</a></li>
|
||||
<li><a href="#zip">ZIP</a></li>
|
||||
</ul></li>
|
||||
@@ -154,10 +153,6 @@ cracking hashes.</li>
|
||||
href="https://github.com/dizcza/docker-hashcat">docker-hashcat</a> -
|
||||
Latest hashcat docker for Ubuntu 18.04 CUDA, OpenCL, and POCL.</li>
|
||||
<li><a
|
||||
href="https://github.com/s77rt/hashcat.launcher">hashcat.launcher</a> -
|
||||
Hashcat.launcher is a cross-platform GUI app that run and control
|
||||
hashcat.</li>
|
||||
<li><a
|
||||
href="https://github.com/xfox64x/Hashcat-Stuffs">Hashcat-Stuffs</a> -
|
||||
Collection of hashcat lists and things.</li>
|
||||
<li><a
|
||||
@@ -199,9 +194,6 @@ a built-in web interface.</li>
|
||||
<li><a href="https://github.com/hashtopolis/server">Hashtopolis</a> - A
|
||||
multi-platform client-server tool for distributing hashcat tasks to
|
||||
multiple computers.</li>
|
||||
<li><a href="https://github.com/jakewnuk/HashtopoCLI">HashtopoloCLI</a>
|
||||
- CLI tool for Hashtopolis API incorporating some of the API
|
||||
functionality into a dynamic Python wrapper.</li>
|
||||
<li><a href="https://github.com/arcaneiceman/kraken">Kraken</a> - A
|
||||
multi-platform distributed brute-force password cracking system.</li>
|
||||
</ul>
|
||||
@@ -234,8 +226,6 @@ hashcat rule.”</li>
|
||||
<li><a href="https://github.com/rarecoil/pantagrule">pantagrule</a> -
|
||||
Large hashcat rulesets generated from real-world compromised
|
||||
passwords.</li>
|
||||
<li><a href="https://github.com/jakewnuk/HIBP-578M">squid rules</a> -
|
||||
Hashcat rules ordered by effectiveness from testing HIBPv7.</li>
|
||||
</ul>
|
||||
<h3 id="rule-tools">Rule tools</h3>
|
||||
<ul>
|
||||
@@ -276,15 +266,11 @@ frontend to John the Ripper.</li>
|
||||
</ul>
|
||||
<h2 id="misc">Misc</h2>
|
||||
<ul>
|
||||
<li><a
|
||||
href="https://github.com/jakewnuk/920mPasswordMasks">920mPasswordMasks</a>
|
||||
- Hashcat password masks from 920 million breach passwords filtered into
|
||||
groups.</li>
|
||||
<li><a href="https://github.com/zefr0x/hashes">Hashes</a> - Identify
|
||||
hashing algorithms (GUI frontend for Name That Hash).</li>
|
||||
<li><a href="https://github.com/cyclone-github/hashgen">hashgen</a> -
|
||||
Hashgen is a simple yet very fast CLI hash generator written in Go and
|
||||
cross compiled for Linux, Windows & Mac.</li>
|
||||
<li><a href="https://github.com/psypanda/hashID">hashID</a> - Software
|
||||
to identify the different types of hashes.</li>
|
||||
<li><a href="https://github.com/HashPals/Name-That-Hash">Name That
|
||||
Hash</a> - Don’t know what type of hash it is? Name That Hash will name
|
||||
that hash type! Identify MD5, SHA256 and 300+ other hashes. Comes with a
|
||||
@@ -309,8 +295,7 @@ href="https://twitter.com/Evil_Mog">Twitter</a>.</li>
|
||||
<li>Hydraze - <a href="https://github.com/Hydraze">GitHub</a> / <a
|
||||
href="https://infosec.exchange/@hydraze">Mastodon</a> / <a
|
||||
href="https://twitter.com/Hydraze">Twitter</a>.</li>
|
||||
<li>JakeWnuk - <a href="https://github.com/jakewnuk">GitHub</a> / <a
|
||||
href="https://infosec.exchange/@JakeWnuk">Mastodon</a>.</li>
|
||||
<li>JakeWnuk - <a href="https://github.com/jakewnuk">GitHub</a>.</li>
|
||||
<li>Kontrast23 - <a href="https://github.com/kontrast23">GitHub</a> / <a
|
||||
href="https://twitter.com/marco_preuss">Twitter</a>.</li>
|
||||
<li>M3g9tr0n - <a href="https://github.com/m3g9tr0n">GitHub</a> / <a
|
||||
@@ -403,10 +388,6 @@ This project uses machine learning to identify password creation habits
|
||||
of users.</li>
|
||||
<li><a href="https://github.com/digininja/pipal">Pipal</a> - THE
|
||||
password analyser.</li>
|
||||
<li><a href="https://github.com/jakewnuk/pwdstat">PwdStat</a> - Tool for
|
||||
identifying systemic password usage, creating password masks, and
|
||||
analyzing cracked password samples with human readable statistics to
|
||||
help defenders.</li>
|
||||
<li><a
|
||||
href="https://github.com/Orange-Cyberdefense/graphcat">Graphcat</a> -
|
||||
Generate graphs and charts based on password cracking result.</li>
|
||||
@@ -453,8 +434,6 @@ href="https://github.com/Rich5/Keyboard-Walk-Generators">Keyboard-Walk-Generator
|
||||
<li><a href="https://github.com/hashcat/kwprocessor">kwprocessor</a> -
|
||||
Advanced keyboard-walk generator with configureable basechars, keymap
|
||||
and routes.</li>
|
||||
<li><a href="https://github.com/jakewnuk/maskcat">maskcat</a> - Utility
|
||||
tool for Hashcat Masks and Password Cracking.</li>
|
||||
<li><a
|
||||
href="https://github.com/hashcat/maskprocessor/">maskprocessor</a> -
|
||||
High-performance word generator with a per-position configureable
|
||||
@@ -467,9 +446,12 @@ Mentalist is a graphical tool for custom wordlist generation. It
|
||||
utilizes common human paradigms for constructing passwords and can
|
||||
output the full wordlist as well as rules compatible with Hashcat and
|
||||
John the Ripper.</li>
|
||||
<li><a href="https://github.com/JakeWnuk/mode">Mode</a> - A program for
|
||||
quickly aggregating and frequency sorting text from multiple sources and
|
||||
supports concurency.</li>
|
||||
<li><a href="https://github.com/JakeWnuk/ptt">PTT</a> - The Password
|
||||
Transformation Tool (ptt) is a versatile utility designed for password
|
||||
cracking. It facilitates the creation of custom rules and
|
||||
transformations, as well as the generation of wordlists. This tool
|
||||
supports processing data from files, URLs, and standard input,
|
||||
streamlining cracking workflows.</li>
|
||||
<li><a href="https://github.com/Sparell/Phraser">Phraser</a> - Phraser
|
||||
is a phrase generator using n-grams and Markov chains to generate
|
||||
phrases for passphrase cracking.</li>
|
||||
@@ -542,17 +524,12 @@ wordlists.</li>
|
||||
multi-threaded PDF password cracking utility equipped with commonly
|
||||
encountered password format builders and dictionary attacks.</li>
|
||||
</ul>
|
||||
<h3 id="pem">PEM</h3>
|
||||
<ul>
|
||||
<li><a href="https://github.com/bwall/pemcracker">pemcracker</a> - Tool
|
||||
to crack encrypted PEM files.</li>
|
||||
</ul>
|
||||
<h3 id="jks">JKS</h3>
|
||||
<ul>
|
||||
<li><a
|
||||
href="https://github.com/floyd-fuh/JKS-private-key-cracker-hashcat">JKS
|
||||
private key cracker</a> - Cracking passwords of private key entries in a
|
||||
JKS fileCracking passwords of private key entries in a JKS file.</li>
|
||||
JKS file.</li>
|
||||
</ul>
|
||||
<h3 id="zip">ZIP</h3>
|
||||
<ul>
|
||||
@@ -566,9 +543,10 @@ for cracking encrypted ZIP archives.</li>
|
||||
<ul>
|
||||
<li><a href="https://github.com/TheAdamProject/adams">adams</a> -
|
||||
Reducing Bias in Modeling Real-world Password Strength via Deep Learning
|
||||
and Dynamic Dictionaries. <a
|
||||
href="https://github.com/cupslab/neural_network_cracking"></a> - Code
|
||||
for cracking passwords with neural networks.</li>
|
||||
and Dynamic Dictionaries.</li>
|
||||
<li><a href="https://github.com/cupslab/neural_network_cracking">neural
|
||||
network cracking</a> - Code for cracking passwords with neural
|
||||
networks.</li>
|
||||
<li><a
|
||||
href="https://github.com/gehaxelt/RNN-Passwords">RNN-Passwords</a> -
|
||||
Using the char-rnn to learn and guess passwords.</li>
|
||||
@@ -615,8 +593,13 @@ Modeling and (Guided) Generation with LLMs</a></li>
|
||||
<h3 id="talks">Talks</h3>
|
||||
<ul>
|
||||
<li><a
|
||||
href="https://github.com/JakeWnuk/Security-Conferences/blob/main/BsidesKY2023%20-%20Leveling%20Up%20Password%20Attacks%20with%20Breach%20Data.pdf">BsidesKY2023
|
||||
- Leveling Up Password Attacks with Breach Data</a></li>
|
||||
href="https://jakewnuk.com/static/No%20Cap%20Cracking%20Improving%20Offline%20Hash%20Recovery%20Methodologies.pdf">BSides
|
||||
Cayman Islands 2024 - No Cap Cracking: Improving Offline Hash Recovery
|
||||
Methodologies</a></li>
|
||||
<li><a
|
||||
href="https://jakewnuk.com/static/Leveling%20Up%20Password%20Attacks%20with%20Breach%20Data.pdf">BSides
|
||||
Cayman Islands 2023 - Leveling Up Password Attacks with Breach
|
||||
Data</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=MBTJ8f6Fsmg">DEF CON Safe
|
||||
Mode Password Village - Getting Started with Hashcat</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=4Ell1Tt23NI">DEF CON Safe
|
||||
@@ -642,3 +625,6 @@ via Deep Learning and Dynamic Dictionaries</a></li>
|
||||
Security ’16 - Fast, Lean, and Accurate: Modeling Password Guessability
|
||||
Using Neural Networks</a></li>
|
||||
</ul>
|
||||
<p><a
|
||||
href="https://github.com/n0kovo/awesome-password-cracking">passwordcracking.md
|
||||
Github</a></p>
|
||||
|
||||
Reference in New Issue
Block a user