Various wordlists FR & EN - Cracking French passwords
-
Updated
May 13, 2024
Various wordlists FR & EN - Cracking French passwords
Tool for Wifi Network Attacks (WPA/WPA2 - PSK- Hijacking - Rainbow Tables - Beacon Flood - DoS Attack - Scanner - Fake/Rogue AP - Force Brute with GPU).
Script to perform some hashcracking logic automagically
Get the private key (id_rsa) passphrase.
W Generator - A powerful frontend tool for penetration testers to generate customized wordlists based on public user information
This is improved on mathematica keygen(this code can also use on system modeler).It has full tutorials and you can input your own actkey.
Distillations and expansions on Rocktastic12a
SSH password crack for penetration tests using brute force and dictionary attacks.
A Password Cracking Tool
P0lyn0m1c0n is a tool that aims to generate custom wordlists according to the target to be used in password attacks during penetration testing exercises.
Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations
StegoCrack is a simple password cracking tool specialized in steganography, using steghide. It provides methods to carry out dictionary and brute force attacks. Educational only and should not be used for illegal purposes.
Bring your wordlists back to life with Wordlist Zombie! Wordlist Zombie uses Markov Chains, and Consonant / Vowel maps to generate wordlists.
lattice attack.ipynb - One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
BRUTE HASH is an hashes cracking tool ; >>> with the location of the wordlist, and the hashed value. The script generates a hash for each word in the list and compares it to the provided hash. If a match is found, it prints the plaintext value. This tool can be useful for security testing,
This is a very simple password cracker that can take case sensitive letters, numbers or symbols as inputs. It will run through nested iterations using Brute Force. The longest this program should run is roughly 20 seconds.
Simple Unix (shadow) hash cracker.
🔐 A curated list of awesome tools, research, papers and other projects related to password cracking and password security.
Add a description, image, and links to the cracking-password topic page so that developers can more easily learn about it.
To associate your repository with the cracking-password topic, visit your repo's landing page and select "manage topics."