update
This commit is contained in:
306
terminal/passwordcracking2
Normal file
306
terminal/passwordcracking2
Normal file
@@ -0,0 +1,306 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Password Cracking [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;12mIn[39m[38;5;12m [39m[38;5;12mcryptanalysis[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msecurity,[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mprocess[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mrecovering[39m[38;5;12m [39m[38;5;12mpasswords[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mstored[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mtransmitted[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mscrambled[39m[38;5;12m [39m[38;5;12mform.[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mapproach[39m[38;5;12m [39m[38;5;12m([39m[38;5;14m[1mbrute-force[0m[38;5;14m[1m [0m[38;5;14m[1mattack[0m[38;5;12m [39m
|
||||
[38;5;12m(https://en.wikipedia.org/wiki/Brute-force_attack))[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrepeatedly[39m[38;5;12m [39m[38;5;12mtry[39m[38;5;12m [39m[38;5;12mguesses[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mavailable[39m[38;5;12m [39m[38;5;12mcryptographic[39m[38;5;12m [39m[38;5;12mhash[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpassword.[39m
|
||||
|
||||
[38;5;12mThis is a curated list of awesome tools, research, papers and other projects related to password cracking and password security by [39m[38;5;14m[1m@n0kovo@infosec.exchange[0m[38;5;12m (https://infosec.exchange/@n0kovo/?l).[39m
|
||||
|
||||
|
||||
[38;5;12mRead [39m[38;5;14m[1mCONTRIBUTING.md[0m[38;5;12m (https://github.com/narkopolo/awesome-password-cracking/blob/main/CONTRIBUTING.md) before contributing! In short:[39m
|
||||
|
||||
[38;5;12m- List is alphabetically sorted[39m
|
||||
[38;5;12m- If in doubt, use [39m[38;5;14m[1mawesome-lint[0m[38;5;12m (https://github.com/sindresorhus/awesome-lint)[39m
|
||||
[38;5;12m- If you think an item shouldn't be here [39m[38;5;14m[1mopen an issue[0m[38;5;12m (https://github.com/narkopolo/awesome-password-cracking/issues/new)[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mContents[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mBooks[0m[38;5;12m (#books)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloud[0m[38;5;12m (#cloud)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mConversion[0m[38;5;12m (#conversion)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashcat[0m[38;5;12m (#hashcat)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mAutomation[0m[38;5;12m (#automation)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mDistributed cracking[0m[38;5;12m (#distributed-cracking)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mRules[0m[38;5;12m (#rules)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mRule tools[0m[38;5;12m (#rule-tools)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mWeb interfaces[0m[38;5;12m (#web-interfaces)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mJohn the Ripper[0m[38;5;12m (#john-the-ripper)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMisc[0m[38;5;12m (#misc)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mNotable People[0m[38;5;12m (#notable-people)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWebsites[0m[38;5;12m (#websites)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mCommunities[0m[38;5;12m (#communities)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mLookup services[0m[38;5;12m (#lookup-services)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWordlist tools[0m[38;5;12m (#wordlist-tools)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mAnalysis[0m[38;5;12m (#analysis)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mGeneration/Manipulation[0m[38;5;12m (#generationmanipulation)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWordlists[0m[38;5;12m (#wordlists)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mLaguage specific[0m[38;5;12m (#laguage-specific)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mOther[0m[38;5;12m (#other)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSpecific file formats[0m[38;5;12m (#specific-file-formats)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mPDF[0m[38;5;12m (#pdf)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mJKS[0m[38;5;12m (#jks)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mZIP[0m[38;5;12m (#zip)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mArtificial Intelligence[0m[38;5;12m (#artificial-intelligence)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mResearch[0m[38;5;12m (#research)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mArticles and Blog Posts[0m[38;5;12m (#articles-and-blog-posts)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mPapers[0m[38;5;12m (#papers)[39m
|
||||
[38;5;12m - [39m[38;5;14m[1mTalks[0m[38;5;12m (#talks)[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mBooks[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mHash Crack: Password Cracking Manual (v3)[0m[38;5;12m (https://www.amazon.com/-/en/Joshua-Picolet/dp/1793458618) - Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mCloud[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloud_crack[0m[38;5;12m (https://github.com/lordsaibat/Cloud_crack) - Crack passwords using Terraform and AWS.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloudcat[0m[38;5;12m (https://github.com/stormfleet/cloudcat) - A script to automate the creation of cloud infrastructure for hash cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloudstomp[0m[38;5;12m (https://github.com/Fmstrat/cloudstomp) - Automated deployment of instances on EC2 via plugin for high CPU/GPU applications at the lowest price.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCloudtopolis[0m[38;5;12m (https://github.com/JoelGMSec/Cloudtopolis) - A tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNPK[0m[38;5;12m (https://github.com/c6fc/npk) - NPK is a distributed hash-cracking platform built entirely of serverless components in AWS including Cognito, DynamoDB, and S3.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPenglab[0m[38;5;12m (https://github.com/mxrch/penglab) - Abuse of Google Colab for cracking hashes.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRook[0m[38;5;12m (https://github.com/JumpsecLabs/Rook) - Automates the creation of AWS p3 instances for use in GPU-based password cracking.[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mConversion[0m
|
||||
[38;5;12m- [39m[38;5;14m[1m7z2hashcat[0m[38;5;12m (https://github.com/philsmd/7z2hashcat) - Extract information from password-protected .7z archives (and .sfx files) such that you can crack these "hashes" with hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mMacinHash[0m[38;5;12m (https://github.com/jmagers/MacinHash) - Convert macOS plist password file to hash file for password crackers.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNetNTLM-Hashcat[0m[38;5;12m (https://github.com/ins1gn1a/NetNTLM-Hashcat) - Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRubeus-to-Hashcat[0m[38;5;12m (https://github.com/PwnDexter/Rubeus-to-Hashcat) - Converts / formats Rubeus kerberoasting output into hashcat readable format.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWINHELLO2hashcat[0m[38;5;12m (https://github.com/Banaanhangwagen/WINHELLO2hashcat) - With this tool one can extract the "hash" from a WINDOWS HELLO PIN. This hash can be cracked with Hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mbitwarden2hashcat[0m[38;5;12m (https://github.com/0x6470/bitwarden2hashcat) - A tool that converts Bitwarden's data into a hashcat-suitable hash.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhc\_to\_7z[0m[38;5;12m (https://github.com/philsmd/hc_to_7z) - Convert 7-Zip hashcat hashes back to 7z archives.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhcxtools[0m[38;5;12m (https://github.com/ZerBea/hcxtools) - Portable solution for conversion of cap/pcap/pcapng (gz compressed) WiFi dump files to hashcat formats.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mitunes_backup2hashcat[0m[38;5;12m (https://github.com/philsmd/itunes_backup2hashcat) - Extract the information needed from the Manifest.plist files to convert it to hashes compatible with hashcat. [39m
|
||||
[38;5;12m- [39m[38;5;14m[1mmongodb2hashcat[0m[38;5;12m (https://github.com/philsmd/mongodb2hashcat) - Extract hashes from the MongoDB database server to a hash format that hashcat accepts: -m 24100 (SCRAM-SHA-1) or -m 24200 (SCRAM-SHA-256).[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mHashcat[0m
|
||||
[48;2;30;30;40m[38;5;14m[1m[3mHashcat[0m[48;2;30;30;40m[38;5;13m[3m (https://github.com/hashcat/hashcat) is the "World's fastest and most advanced password recovery utility." The following are projects directly related to Hashcat in one way or another.[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mAutocrack[0m[38;5;12m (https://github.com/pry0cc/autocrack) - A set of client and server tools for automatically, and lightly automatically cracking hashes.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mdocker-hashcat[0m[38;5;12m (https://github.com/dizcza/docker-hashcat) - Latest hashcat docker for Ubuntu 18.04 CUDA, OpenCL, and POCL.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashcat-Stuffs[0m[38;5;12m (https://github.com/xfox64x/Hashcat-Stuffs) - Collection of hashcat lists and things.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhashcat-utils[0m[38;5;12m (https://github.com/hashcat/hashcat-utils/) - Small utilities that are useful in advanced password cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashfilter[0m[38;5;12m (https://github.com/bharshbarger/Hashfilter) - Read a hashcat potfile and parse different types into a sqlite database.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mknown_hosts-hashcat[0m[38;5;12m (https://github.com/chris408/known_hosts-hashcat) - A guide and tool for cracking ssh known_hosts files with hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpyhashcat[0m[38;5;12m (https://github.com/f0cker/pyhashcat) - Python C API binding to libhashcat.[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mAutomation[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mautocrack[0m[38;5;12m (https://github.com/timbo05sec/autocrack) - Hashcat wrapper to help automate the cracking process.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhat[0m[38;5;12m (https://github.com/sp00ks-git/hat) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes during engagements.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhate_crack[0m[38;5;12m (https://github.com/trustedsec/hate_crack) - A tool for automating cracking methodologies through Hashcat from the TrustedSec team.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mNaive hashcat[0m[38;5;12m (https://github.com/brannondorsey/naive-hashcat) - Naive hashcat is a plug-and-play script that is pre-configured with naive, emperically-tested, "good enough" parameters/attack types.[39m
|
||||
|
||||
[38;2;255;187;0m[4mDistributed cracking[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mCrackLord[0m[38;5;12m (https://github.com/jmmcatee/cracklord) - Queue and resource system for cracking passwords.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mfitcrack[0m[38;5;12m (https://github.com/nesfit/fitcrack) - A hashcat-based distributed password cracking system.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashstation[0m[38;5;12m (https://github.com/hashstation/hashstation) - Hashstation is a BOINC-based distributed password cracking system with a built-in web interface.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashtopolis[0m[38;5;12m (https://github.com/hashtopolis/server) - A multi-platform client-server tool for distributing hashcat tasks to multiple computers.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKraken[0m[38;5;12m (https://github.com/arcaneiceman/kraken) - A multi-platform distributed brute-force password cracking system.[39m
|
||||
|
||||
[38;2;255;187;0m[4mRules[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mclem9669 rules[0m[38;5;12m (https://github.com/clem9669/hashcat-rule) - Rule for hashcat or john.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhashcat rules collection[0m[38;5;12m (https://github.com/narkopolo/hashcat-rules-collection) - Probably the largest collection of hashcat rules out there.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHob0Rules[0m[38;5;12m (https://github.com/praetorian-inc/Hob0Rules) - Password cracking rules for Hashcat based on statistics and industry patterns.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKaonashi[0m[38;5;12m (https://github.com/kaonashi-passwords/Kaonashi) - Wordlist, rules and masks from Kaonashi project (RootedCON 2019).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mnsa-rules[0m[38;5;12m (https://github.com/NSAKEY/nsa-rules) - Password cracking rules and masks for hashcat generated from cracked passwords.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mnyxgeek-rules[0m[38;5;12m (https://github.com/nyxgeek/nyxgeek-rules) - Custom password cracking rules for Hashcat and John the Ripper.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mOneRuleToRuleThemAll[0m[38;5;12m (https://github.com/NotSoSecure/password_cracking_rules) - "One rule to crack all passwords. or atleast we hope so."[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mOneRuleToRuleThemStill[0m[38;5;12m (https://github.com/stealthsploit/OneRuleToRuleThemStill) - "A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule."[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpantagrule[0m[38;5;12m (https://github.com/rarecoil/pantagrule) - Large hashcat rulesets generated from real-world compromised passwords.[39m
|
||||
|
||||
[38;2;255;187;0m[4mRule tools[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mduprule[0m[38;5;12m (https://github.com/mhasbini/duprule) - Detect & filter duplicate hashcat rules.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mruleprocessorY[0m[38;5;12m (https://github.com/TheWorkingDeveloper/ruleprocessorY) - A next-gen Rule processor with complex multibyte character support built to support Hashcat.[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWeb interfaces[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mcrackerjack[0m[38;5;12m (https://github.com/ctxis/crackerjack) - CrackerJack is a Web GUI for Hashcat developed in Python.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCrackQ[0m[38;5;12m (https://github.com/f0cker/crackq) - A Python Hashcat cracking queue system.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhashpass[0m[38;5;12m (https://github.com/dj-zombie/hashpass) - Hash cracking WebApp & Server for hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashview[0m[38;5;12m (https://github.com/hashview/hashview) - A web front-end for password cracking and analytics.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWavecrack[0m[38;5;12m (https://github.com/wavestone-cdt/wavecrack) - Wavestone's web interface for password cracking with hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWebHashCat[0m[38;5;12m (https://github.com/hegusung/WebHashcat) - WebHashcat is a very simple but efficient web interface for hashcat password cracking tool.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mJohn the Ripper[0m
|
||||
[48;2;30;30;40m[38;5;14m[1m[3mJohn the Ripper[0m
|
||||
[48;2;30;30;40m[38;5;13m[3m (https://github.com/openwall/john) is "an Open Source password security auditing and password recovery tool available for many operating systems." The following are projects directly related to John the Ripper in one way or another.[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1mBitCracker[0m[38;5;12m (https://github.com/e-ago/bitcracker) - BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mjohnny[0m[38;5;12m (https://github.com/openwall/johnny) - GUI frontend to John the Ripper.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mMisc[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashes[0m[38;5;12m (https://github.com/zefr0x/hashes) - Identify hashing algorithms (GUI frontend for Name That Hash).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mhashgen[0m[38;5;12m (https://github.com/cyclone-github/hashgen) - Hashgen is a simple yet very fast CLI hash generator written in Go and cross compiled for Linux, Windows & Mac.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mName That Hash[0m[38;5;12m (https://github.com/HashPals/Name-That-Hash) - Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 300+ other hashes. Comes with a neat web app.[39m
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mNotable People[0m
|
||||
[38;5;12m- Alotdv - [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/AlongExc).[39m
|
||||
[38;5;12m- Clem9669 - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/clem9669).[39m
|
||||
[38;5;12m- Coolbry95 - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/coolbry95) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/coolbry95).[39m
|
||||
[38;5;12m- Dakykilla - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/dakykilla) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/dakykilla).[39m
|
||||
[38;5;12m- Dropdeadfu - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/dropdeadfu) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/dropdeadfu).[39m
|
||||
[38;5;12m- Epixoip - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/epixoip) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@epixoip) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/jmgosney).[39m
|
||||
[38;5;12m- Evilmog - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/evilmog/) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@evilmog) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/Evil_Mog).[39m
|
||||
[38;5;12m- Hydraze - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/Hydraze) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@hydraze) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/Hydraze).[39m
|
||||
[38;5;12m- JakeWnuk - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/jakewnuk).[39m
|
||||
[38;5;12m- Kontrast23 - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/kontrast23) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/marco_preuss).[39m
|
||||
[38;5;12m- M3g9tr0n - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/m3g9tr0n) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/m3g9tr0n).[39m
|
||||
[38;5;12m- Matrix - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/matrix) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/gm4tr1x).[39m
|
||||
[38;5;12m- Minga - [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/mingadotcom).[39m
|
||||
[38;5;12m- N0kovo - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/n0kovo) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@n0kovo) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/n0kovos).[39m
|
||||
[38;5;12m- NSAKEY - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/NSAKEY) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/_NSAKEY) / [39m[38;5;14m[1mWebsite[0m[38;5;12m (https://abigisp.com/).[39m
|
||||
[38;5;12m- NullMode - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/NullMode) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@nullmode_@twtr.plus) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/nullmode_).[39m
|
||||
[38;5;12m- Paule965 - [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/paule965).[39m
|
||||
[38;5;12m- Philsmd - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/philsmd) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/philsmd).[39m
|
||||
[38;5;12m- Roycewilliams - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/roycewilliams) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@tychotithonus) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/TychoTithonus).[39m
|
||||
[38;5;12m- RuraPenthe - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/bitcrackcyber) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@rurapenthe) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/RuraPenthe0).[39m
|
||||
[38;5;12m- S3in!c - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/s3inlc) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@s3inlc) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/s3inlc).[39m
|
||||
[38;5;12m- Tehnlulz - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/tehnlulz) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/tehnlulz).[39m
|
||||
[38;5;12m- The_Mechanic - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/th3mechanic) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/th3_m3chan1c).[39m
|
||||
[38;5;12m- ToXiC - [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/yiannistox).[39m
|
||||
[38;5;12m- Undeath - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/undeath).[39m
|
||||
[38;5;12m- Unix-ninja - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/unix-ninja) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@unix_ninja@twitterbridge.jannis.rocks) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/unix_ninja).[39m
|
||||
[38;5;12m- Xan - [39m[38;5;14m[1mGitHub[0m[38;5;12m (https://github.com/Xanadrel) / [39m[38;5;14m[1mMastodon[0m[38;5;12m (https://infosec.exchange/@Xanadrel) / [39m[38;5;14m[1mTwitter[0m[38;5;12m (https://twitter.com/Xanadrel).[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWebsites[0m
|
||||
|
||||
[38;2;255;187;0m[4mCommunities[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mhashcat Forum[0m[38;5;12m (https://hashcat.net/forum/) - Forum by the developers of hashcat.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashmob[0m[38;5;12m (https://hashmob.net/) - A growing password recovery community aimed towards being a center point of collaboration for cryptography enthusiasts. Huge wordlist collection and a lookup service too.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashkiller Forum[0m[38;5;12m (https://forum.hashkiller.io/) - A password cracking forum with over 20,000 registered users.[39m
|
||||
|
||||
[38;2;255;187;0m[4mLookup services[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mCMD5[0m[38;5;12m (https://www.cmd5.org/) - Provides online MD5 / sha1/ mysql / sha256 encryption and decryption services.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCrackStation[0m[38;5;12m (https://crackstation.net/) - Free hash lookup service supplying wordlists as well.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mgohashmob[0m[38;5;12m (https://github.com/n0kovo/gohashmob) - Go CLI app to quickly lookup hashes using the HashMob API.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashes.com[0m[38;5;12m (https://hashes.com/) - A hash lookup service with paid features.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHashkiller[0m[38;5;12m (https://hashkiller.io/) - A hash lookup service with a forum.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mOnline Hash Crack[0m[38;5;12m (https://www.onlinehashcrack.com/) - Cloud password recovery service.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWordlist tools[0m
|
||||
[48;2;30;30;40m[38;5;13m[3mTools for analyzing, generating and manipulating wordlists.[0m
|
||||
|
||||
[38;2;255;187;0m[4mAnalysis[0m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPACK[0m[38;5;12m [39m[38;5;12m(https://github.com/iphelix/pack)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mutilities[39m[38;5;12m [39m[38;5;12mdeveloped[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12maid[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12manalysis[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mlists[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12menhance[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12mpattern[39m[38;5;12m [39m[38;5;12mdetection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmasks,[39m[38;5;12m [39m[38;5;12mrules,[39m[38;5;12m [39m[38;5;12mcharacter-sets[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mother[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m
|
||||
[38;5;12mcharacteristics.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpassword-smelter[0m[38;5;12m (https://github.com/TheTechromancer/password-smelter) - Ingests passwords from hashcat, etc. and outputs to HTML, Markdown, XLSX, PNG, JSON. Dark and light themes supported. Compliments password-stretcher.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpassword-stretcher[0m[38;5;12m (https://github.com/thetechromancer/password-stretcher) - Generate "disgusting quantities" of passwords from websites, files, or stdin. Compliments password-smelter.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mpcfg_cracker[0m[38;5;12m (https://github.com/lakiw/pcfg_cracker) - This project uses machine learning to identify password creation habits of users.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPipal[0m[38;5;12m (https://github.com/digininja/pipal) - THE password analyser.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGraphcat[0m[38;5;12m (https://github.com/Orange-Cyberdefense/graphcat) - Generate graphs and charts based on password cracking result.[39m
|
||||
|
||||
[38;2;255;187;0m[4mGeneration/Manipulation[0m
|
||||
|
||||
[38;5;12m- [39m[38;5;14m[1maccent_permutator[0m[38;5;12m (https://github.com/cyclone-github/accent_permutator) - A tool to transform characters from ASCII / UTF-8 to accented characters such as "o" to "ò".[39m
|
||||
[38;5;12m- [39m[38;5;14m[1manew[0m[38;5;12m (https://github.com/tomnomnom/anew) - Append lines from stdin to a file, but only if they don't already appear in the file. Outputs new lines to stdout too, making it a bit like a tee -a that removes duplicates.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mbopscrk[0m[38;5;12m (https://github.com/r3nt0n/bopscrk) - Generate smart and powerful wordlists for targeted attacks. Includes song lyrics fetching and different transforms.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mcommon-substr[0m[38;5;12m (https://github.com/sensepost/common-substr) - Simple tool to extract the most common substrings from an input text. Built for password cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCrunch[0m[38;5;12m (https://sourceforge.net/projects/crunch-wordlist/) - Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. Crunch can generate all possible combinations and permutations.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCUPP[0m[38;5;12m (https://github.com/Mebus/cupp) - A tool that lets you generate wordlists by user profiling data such as birthday, nickname, address, name of a pet or relative etc.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mduplicut[0m[38;5;12m (https://github.com/nil0x42/duplicut) - Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking).[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGorilla[0m[38;5;12m (https://github.com/d4rckh/gorilla) - Tool for generating wordlists or extending an existing one using mutations.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGramify[0m[38;5;12m (https://github.com/TheWorkingDeveloper/gramify) - Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mElpscrk[0m[38;5;12m (https://github.com/D4Vinci/elpscrk) - Elpscrk is like cupp, but it's based on permutations and statistics while being memory efficient.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mKeyboard-Walk-Generators[0m[38;5;12m (https://github.com/Rich5/Keyboard-Walk-Generators) - Generate Keyboard Walk Dictionaries for cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mkwprocessor[0m[38;5;12m (https://github.com/hashcat/kwprocessor) - Advanced keyboard-walk generator with configureable basechars, keymap and routes.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mmaskprocessor[0m[38;5;12m (https://github.com/hashcat/maskprocessor/) - High-performance word generator with a per-position configureable charset.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mmaskuni[0m[38;5;12m (https://github.com/flbdx/maskuni) - A standalone fast word generator in the spirit of hashcat's mask generator with unicode support.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mMentalist[0m[38;5;12m [39m[38;5;12m(https://github.com/sc0tfree/mentalist)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mMentalist[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mgraphical[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcustom[39m[38;5;12m [39m[38;5;12mwordlist[39m[38;5;12m [39m[38;5;12mgeneration.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mhuman[39m[38;5;12m [39m[38;5;12mparadigms[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mconstructing[39m[38;5;12m [39m[38;5;12mpasswords[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12moutput[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mfull[39m[38;5;12m [39m[38;5;12mwordlist[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mrules[39m[38;5;12m [39m[38;5;12mcompatible[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m
|
||||
[38;5;12mHashcat[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mJohn[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mRipper.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mPTT[0m[38;5;12m [39m[38;5;12m(https://github.com/JakeWnuk/ptt)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mPassword[39m[38;5;12m [39m[38;5;12mTransformation[39m[38;5;12m [39m[38;5;12mTool[39m[38;5;12m [39m[38;5;12m(ptt)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mversatile[39m[38;5;12m [39m[38;5;12mutility[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mcracking.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mfacilitates[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcreation[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcustom[39m[38;5;12m [39m[38;5;12mrules[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtransformations,[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mgeneration[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwordlists.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m
|
||||
[38;5;12mtool[39m[38;5;12m [39m[38;5;12msupports[39m[38;5;12m [39m[38;5;12mprocessing[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mfiles,[39m[38;5;12m [39m[38;5;12mURLs,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mstandard[39m[38;5;12m [39m[38;5;12minput,[39m[38;5;12m [39m[38;5;12mstreamlining[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mworkflows.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPhraser[0m[38;5;12m (https://github.com/Sparell/Phraser) - Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mprinceprocessor[0m[38;5;12m (https://github.com/hashcat/princeprocessor) - Standalone password candidate generator using the PRINCE algorithm.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRephraser[0m[38;5;12m (https://github.com/travco/rephraser) - A Python-based reimagining of Phraser using Markov-chains for linguistically-correct password cracking.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRling[0m[38;5;12m (https://github.com/Cynosureprime/rling) - RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mstatsprocessor[0m[38;5;12m (https://github.com/hashcat/statsprocessor/) - Word generator based on per-position markov-chains.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mStringZilla[0m[38;5;12m (https://github.com/ashvardanian/StringZilla) - Fastest string sort, search, split, and shuffle for long strings and multi-gigabyte files in Python and C.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTTPassGen[0m[38;5;12m (https://github.com/tp7309/TTPassGen) - Flexible and scriptable password dictionary generator which supportss brute-force, combination, complex rule modes etc.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mtoken-reverser[0m[38;5;12m (https://github.com/dariusztytko/token-reverser) - Words list generator to crack security tokens.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWikiRaider[0m[38;5;12m (https://github.com/NorthwaveSecurity/wikiraider) - WikiRaider enables you to generate wordlists based on country specific databases of Wikipedia.[39m
|
||||
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mWordlists[0m
|
||||
[38;2;255;187;0m[4mLaguage specific[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mAlbanian wordlist[0m[38;5;12m (https://github.com/its0x08/albanian-wordlist) - A mix of names, last names and some albanian literature.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mDanish[0m[38;5;14m[1m [0m[38;5;14m[1mPhone[0m[38;5;14m[1m [0m[38;5;14m[1mWordlist[0m[38;5;14m[1m [0m[38;5;14m[1mGenerator[0m[38;5;12m [39m[38;5;12m(https://github.com/narkopolo/danish_phone_wordlist_generator)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mgenerate[39m[38;5;12m [39m[38;5;12mwordlists[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDanish[39m[38;5;12m [39m[38;5;12mphone[39m[38;5;12m [39m[38;5;12mnumbers[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12marea[39m[38;5;12m [39m[38;5;12mand/or[39m[38;5;12m [39m[38;5;12musage[39m[38;5;12m [39m[38;5;12m(Mobile,[39m[38;5;12m [39m[38;5;12mlandline[39m[38;5;12m [39m[38;5;12metc.)[39m[38;5;12m [39m[38;5;12mUseful[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mfuzzing[39m[38;5;12m [39m
|
||||
[38;5;12mDanish[39m[38;5;12m [39m[38;5;12mtargets.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDanish Wordlists[0m[38;5;12m (https://github.com/narkopolo/danish-wordlists) - Collection of danish wordlists for cracking danish passwords.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFrench Wordlists[0m[38;5;12m (https://github.com/clem9669/wordlists) - This project aim to provide french word list about everything a person could use as a base password.[39m
|
||||
|
||||
[38;2;255;187;0m[4mOther[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mPacket Storm Wordlists[0m[38;5;12m (https://packetstormsecurity.com/Crackers/wordlists/page1/) - A substantial collection of different wordlists in multiple languages.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRocktastic[0m[38;5;12m (https://labs.nettitude.com/tools/rocktastic/) - Includes many permutations of passwords and patterns that have been observed in the wild.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRockYou2021[0m[38;5;12m (https://github.com/ohmybahgosh/RockYou2021.txt) - RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWeakPass[0m[38;5;12m (https://weakpass.com/) - Collection of large wordlists.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mSpecific file formats[0m
|
||||
[38;2;255;187;0m[4mPDF[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mpdfrip[0m[38;5;12m (https://github.com/mufeedvh/pdfrip) - A multi-threaded PDF password cracking utility equipped with commonly encountered password format builders and dictionary attacks.[39m
|
||||
|
||||
[38;2;255;187;0m[4mJKS[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mJKS private key cracker[0m[38;5;12m (https://github.com/floyd-fuh/JKS-private-key-cracker-hashcat) - Cracking passwords of private key entries in a JKS file.[39m
|
||||
|
||||
[38;2;255;187;0m[4mZIP[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mbkcrack[0m[38;5;12m (https://github.com/kimci86/bkcrack) - Crack legacy zip encryption with Biham and Kocher's known plaintext attack.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mfrackzip[0m[38;5;12m (https://github.com/hyc/fcrackzip) - Small tool for cracking encrypted ZIP archives.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mArtificial Intelligence[0m
|
||||
[38;5;12m- [39m[38;5;14m[1madams[0m[38;5;12m (https://github.com/TheAdamProject/adams) - Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mneural network cracking[0m[38;5;12m (https://github.com/cupslab/neural_network_cracking) - Code for cracking passwords with neural networks.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mRNN-Passwords[0m[38;5;12m (https://github.com/gehaxelt/RNN-Passwords) - Using the char-rnn to learn and guess passwords.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mrulesfinder[0m[38;5;12m (https://github.com/synacktiv/rulesfinder) - This tool finds efficient password mangling rules (for John the Ripper or Hashcat) for a given dictionary and a list of passwords.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPassGPT[0m[38;5;12m (https://github.com/javirandor/passgpt) - PassGPT is a GPT-2 model trained from scratch on password leaks.[39m
|
||||
|
||||
|
||||
|
||||
[38;2;255;187;0m[4mResearch[0m
|
||||
|
||||
[38;2;255;187;0m[4mArticles and Blog Posts[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mOptimizing Wordlists with Masks[0m[38;5;12m (https://jakewnuk.com/posts/optimizing-wordlists-w-masks/)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPurple Rain Attack - Password Cracking With Random Generation[0m[38;5;12m (https://www.netmux.com/blog/purple-rain-attack)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSmashing Hashes with Token Swapping Attacks[0m[38;5;12m (https://jakewnuk.com/posts/token-swapping-attack/)[39m
|
||||
|
||||
[38;2;255;187;0m[4mPapers[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mGenerating Optimized Guessing Candidates toward Better Password Cracking from Multi-Dictionaries Using Relativistic GAN (2020)[0m[38;5;12m (https://www.mdpi.com/2076-3417/10/20/7306/htm)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGENPass: A General Deep Learning Model for Password Guessing with PCFG Rules and Adversarial Generation (2018)[0m[38;5;12m (https://ieeexplore.ieee.org/document/8422243)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPassword Cracking Using Probabilistic Context-Free Grammars (2009)[0m[38;5;12m (https://www.researchgate.net/publication/220713709_Password_Cracking_Using_Probabilistic_Context-Free_Grammars)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mReducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries (2020)[0m[38;5;12m (https://arxiv.org/abs/2010.12269)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (2016)[0m[38;5;12m (https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPassGAN: A Deep Learning Approach for Password Guessing (2017)[0m[38;5;12m (https://arxiv.org/pdf/1709.00440)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mPassGPT: Password Modeling and (Guided) Generation with LLMs[0m[38;5;12m (https://arxiv.org/abs/2306.01545)[39m
|
||||
|
||||
[38;2;255;187;0m[4mTalks[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mBSides Cayman Islands 2024 - No Cap Cracking: Improving Offline Hash Recovery Methodologies[0m[38;5;12m (https://jakewnuk.com/static/No%20Cap%20Cracking%20Improving%20Offline%20Hash%20Recovery%20Methodologies.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBSides Cayman Islands 2023 - Leveling Up Password Attacks with Breach Data[0m[38;5;12m (https://jakewnuk.com/static/Leveling%20Up%20Password%20Attacks%20with%20Breach%20Data.pdf)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDEF CON Safe Mode Password Village - Getting Started with Hashcat[0m[38;5;12m (https://www.youtube.com/watch?v=MBTJ8f6Fsmg)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDEF CON Safe Mode Password Village - Jeremi Gosney - Cracking at Extreme Scale[0m[38;5;12m (https://www.youtube.com/watch?v=4Ell1Tt23NI)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDEF CON 28 Safe Mode Password Village – 'Let's Crack RockYou Without Using rockyou txt'[0m[38;5;12m (https://www.youtube.com/watch?v=8FtXntEsZdU)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecTor 2019 - Will Hunt - Hashes, Hashes Everywhere, But All I See Is Plaintext[0m[38;5;12m (https://sector.ca/sessions/hashes-hashes-everywhere-but-all-i-see-is-plaintext/)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTailored, Machine Learning-driven Password Guessing Attacks and Mitigation at DefCamp[0m[38;5;12m (https://www.youtube.com/watch?v=iK6ZbD6v9Gg)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUNHash - Methods for better password cracking[0m[38;5;12m (https://media.ccc.de/v/31c3_-_5966_-_en_-_saal_1_-_201412292245_-_unhash_-_methods_for_better_password_cracking_-_tonimir_kisasondi)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUSENIX Security '21 - Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries[0m[38;5;12m (https://www.youtube.com/watch?v=Jvp3UTdCeag)[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mUSENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks[0m[38;5;12m (https://www.youtube.com/watch?v=GgaZ_LxsL_8)[39m
|
||||
|
||||
[38;5;12mpasswordcracking Github: https://github.com/n0kovo/awesome-password-cracking[39m
|
||||
Reference in New Issue
Block a user