Password Attacks

Awesome Password Cracking : Unlocking The Code – A Comprehensive Guide To Tools And Techniques

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system in scrambled form.

A common approach (brute-force attack) is to repeatedly try guesses for the password and to check them against an available cryptographic hash of the password.

This is a curated list of awesome tools, research, papers and other projects related to password cracking and password security by @n0kovo@infosec.exchange.

Read CONTRIBUTING.md before contributing! In short:

Contents

  • Books
  • Cloud
  • Conversion
  • Hashcat
    • Automation
    • Distributed cracking
    • Rules
    • Rule tools
    • Web interfaces
  • John the Ripper
  • Misc
    • Notable People
  • Websites
    • Communities
    • Lookup services
  • Wordlist tools
    • Analysis
    • Generation/Manipulation
  • Wordlists
    • Laguage specific
    • Other
  • Specific file formats
    • PDF
    • PEM
    • JKS
    • ZIP
  • Artificial Intelligence
  • Research
    • Articles and Blog Posts
    • Papers
    • Talks

Books

Cloud

  • Cloud_crack – Crack passwords using Terraform and AWS.
  • Cloudcat – A script to automate the creation of cloud infrastructure for hash cracking.
  • Cloudstomp – Automated deployment of instances on EC2 via plugin for high CPU/GPU applications at the lowest price.
  • Cloudtopolis – A tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).
  • NPK – NPK is a distributed hash-cracking platform built entirely of serverless components in AWS including Cognito, DynamoDB, and S3.
  • Penglab – Abuse of Google Colab for cracking hashes.
  • Rook – Automates the creation of AWS p3 instances for use in GPU-based password cracking.

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Promptmap

Prompt injection is a type of security vulnerability that can be exploited to control the…

1 day ago

Firefly – Black Box Fuzzer For Web Applications

Firefly is an advanced black-box fuzzer and not just a standard asset discovery tool. Firefly…

1 day ago

Winit : Cross-Platform Window Creation And Management In Rust

Winit is a robust, cross-platform library designed for creating and managing windows in Rust applications.…

1 day ago

Browser Autofill Phishing – The Hidden Dangers And Security Risks

In today’s digital age, convenience often comes at the cost of security. One such overlooked…

1 day ago

Terminal GPT (tgpt) – Your Direct CLI Gateway To ChatGPT 3.5

Terminal GPT (tgpt) offers a seamless way to bring the power of ChatGPT 3.5 directly…

1 day ago

garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language Model Security

garak checks if an LLM can be made to fail in a way we don't…

4 days ago