Password Attacks

Awesome Password Cracking : Unlocking The Code – A Comprehensive Guide To Tools And Techniques

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form.

A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password.

This is a curated list of awesome tools, research, papers and other projects related to password cracking and password security by @n0kovo@infosec.exchange.

Read CONTRIBUTING.md before contributing! In short:

Contents

  • Books
  • Cloud
  • Conversion
  • Hashcat
    • Automation
    • Distributed cracking
    • Rules
    • Rule tools
    • Web interfaces
  • John the Ripper
  • Misc
    • Notable People
  • Websites
    • Communities
    • Lookup services
  • Wordlist tools
    • Analysis
    • Generation/Manipulation
  • Wordlists
    • Laguage specific
    • Other
  • Specific file formats
    • PDF
    • PEM
    • JKS
    • ZIP
  • Artificial Intelligence
  • Research
    • Articles and Blog Posts
    • Papers
    • Talks

Books

Cloud

  • Cloud_crack – Crack passwords using Terraform and AWS.
  • Cloudcat – A script to automate the creation of cloud infrastructure for hash cracking.
  • Cloudstomp – Automated deployment of instances on EC2 via plugin for high CPU/GPU applications at the lowest price.
  • Cloudtopolis – A tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).
  • NPK – NPK is a distributed hash-cracking platform built entirely of serverless components in AWS including Cognito, DynamoDB, and S3.
  • Penglab – Abuse of Google Colab for cracking hashes.
  • Rook – Automates the creation of AWS p3 instances for use in GPU-based password cracking.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Starship : Revolutionizing Terminal Experiences Across Shells

Starship is a powerful, minimal, and highly customizable cross-shell prompt designed to enhance the terminal…

14 hours ago

Lemmy : A Decentralized Link Aggregator And Forum For The Fediverse

Lemmy is an innovative, open-source platform designed for link aggregation and discussion, providing a decentralized…

14 hours ago

Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0

The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing…

16 hours ago

Ghauri : A Powerful SQL Injection Detection And Exploitation Tool

Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL…

18 hours ago

Writing Tools : Revolutionizing The Art Of Writing

Writing tools have become indispensable for individuals looking to enhance their writing efficiency, accuracy, and…

18 hours ago

PatchWerk : A Tool For Cleaning NTDLL Syscall Stubs

PatchWerk is a proof-of-concept (PoC) tool designed to clean NTDLL syscall stubs by patching syscall…

2 days ago