There are 3 repositories under rainbow-table topic.
🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
HashCobra Hash Cracking tool.
Bulgarian wordlists (списък с думи на Български език)
A5/1 Decryption
DEScrypt CPU Collision Cracker
Audible audio book converter which actually works!
Crack the django password on the way. By default Django use pbkdf2 and sha256 method to encrypt user's password. Once get the password stored in the database table, you need to compare it with others if brute force cracking. It is recommended that you use hash table comparison. The tool 'rainbow crack' can generate rainbow hash tables while another tool 'hashcat' brute-force cracks password from a dictionary alive. Because django uses PBKDF2(Password-Based Key Derivation Function), it would take too long to generate a password.
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
HashExpoit is Great Tool For Cracking Hash
aircrack-ng gui 2019
A simple rainbow table generator supporting MD5, SHA224, SHA256, SHA384, and SHA512, written in Python 2.7.
RainbowHash is a Great Tool For Cracking or Recovering Hashed password.
Xss, sql-injection, php, login, Csrf, security, rainbow table, encryption, salt
🚨Computational Forensics is an emerging research🔎 domain. It deals with 🕵️♀️solving forensic problems🚔 using digital methods👨💻. It uses computational science to study digital evidence.
Rainbow Table attack to break zkcrush.xyz and reveal your crush.
CLI app that cracks password using a Rainbow Table made with C++ for education purposes.
Python Scripts for Miscellaneous Purposes
Multithreaded C# and c++ application that computes hashes to create your own rainbow tables in MD5 or SHA256
Linux snap port of the rainbowcrack tools (http://project-rainbowcrack.com/).
knotty, a CLI tool for cracking and computing hashes, and generating rainbow tables in 50+ hashing algorithms.
Cycles through any given character set in any given order and outputs to standard output or to a file. For larger data sets, like 128-bit MD5 hashes, 160-bit SHA-1, 256-bit SHA-256, etc., it is recommended to only do a couple character combinations at a time, unless you plan on having the script run for days on end uninterrupted.
a rust program to generate a rainbow table of a dictionary of passwords.
Information Security -- How to hack a password. One particular use case for hashing is for user authentication. Given an original object (password, file, image, etc), the content is hashed into SHA1, or MD5, and stored in database. So, even the application could not revert a given hashed object to its original content. To authenticate, the user will supply an original object {password, file, image, etc}. the same hash routine is applied to produce a hashed object. This hashed object is compared with one stored in the database looking for a match.
This program has been made for learning purposes. The project was part of my bridge year in my master degree at ULB.