Hashing & Cryptography

Tools designed to break hashes and cryptogrphy.

9 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

AirCrack 

Open-source      

Wifi password retrieval with FMS

BruteForce Wallet 

Open-source      

Wallet password search

ctf-tools 

Open-source      

Scripts to install various security research tools and deploy to new machines

Hashcat 

Open-source      

Hash cracking tool

John the Ripper 

Open-source      

Password cracker

JWT Cracker 

Open-source      

HS256 JWT token brute force cracker

Medusa 

Open-source      

Brute-force parallel testing password cracker

Rainbow Crack 

Free      

Hash cracker using large-scale time-memory technique

Rainbow Tables 

Free      

Rainbow table generator with verification