1ma / diceware-catLinks
Diccionaris catalans per a generar contrasenyes Diceware
☆18Updated 9 years ago
Alternatives and similar repositories for diceware-cat
Users that are interested in diceware-cat are comparing it to the libraries listed below
Sorting:
- Игровой автомат на js☆15Updated 9 years ago
- A simple bash virus (without payload) for the second assignment of the "Malware analysis and design" course in Master Degree in Computer …☆13Updated 8 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Updated 4 months ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- List of HTB v4 APIs☆14Updated last year
- Customized docker images generation toolkit☆26Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Exim transport_filter python script that puts a user's RID value where a macro can see it for GoPhish attachment phishing tests☆21Updated 4 years ago
- Wordlist generator☆16Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- ☆16Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- hMailServer Password Decrypter☆12Updated 9 years ago
- Various scripts and codes☆84Updated 4 years ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Updated 6 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Updated 6 years ago
- Neverwinter Invoke Bot☆20Updated 6 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 6 years ago
- ☆26Updated 2 years ago
- Material from CTF machines I have attempted☆39Updated 4 years ago
- Service that provides reviews on products and services☆16Updated 13 years ago
- ☆10Updated 2 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Updated 3 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16Updated 7 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆74Updated 3 years ago