Codex-Major / Wordlist-GeneratorLinks
A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.
☆15Updated 4 years ago
Alternatives and similar repositories for Wordlist-Generator
Users that are interested in Wordlist-Generator are comparing it to the libraries listed below
Sorting:
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆86Updated 4 years ago
- A WLAN red team framework.☆154Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆132Updated last year
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆84Updated 6 years ago
- Turn PuTTY into an SSH login bruteforcing tool.☆290Updated 5 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- This Script Will Detect Canary Token in Microsoft Word Documents☆56Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆72Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆259Updated 6 months ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆71Updated 4 years ago
- An Encrypted File transfer via AES-256-CBC☆52Updated 4 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- Zero Infrastructure Password Cracking☆411Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- ☆36Updated 2 years ago
- ☆186Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 4 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆73Updated 3 years ago
- Collection of GoPhish templates available for legitimate usage.☆162Updated 2 years ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated last week