BishopFox / wordlist-sanitizerView external linksLinks
Remove Offensive and Profane Words from Wordlists
☆15Jul 27, 2023Updated 2 years ago
Alternatives and similar repositories for wordlist-sanitizer
Users that are interested in wordlist-sanitizer are comparing it to the libraries listed below
Sorting:
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 3 months ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- PoC's and Slides from 'Gophers, whales and.. clouds? Oh my!' BSides Wellington presentation by Glenn 'devalias' Grant☆17Mar 3, 2018Updated 7 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Dec 1, 2020Updated 5 years ago
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Scans SMB for Vuln Assessment☆17Mar 4, 2017Updated 8 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Sep 24, 2021Updated 4 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆17Jul 7, 2022Updated 3 years ago
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆33Dec 18, 2019Updated 6 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago