DanMcInerney / Probable-WordlistsLinks
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
☆16Updated 7 years ago
Alternatives and similar repositories for Probable-Wordlists
Users that are interested in Probable-Wordlists are comparing it to the libraries listed below
Sorting:
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- wifi attacks suite☆59Updated 5 years ago
- Evil Twin Attack Bash script☆12Updated 9 years ago
- ARP spoof then session jack within your browser☆28Updated 12 years ago
- A quick, dirty, and effective USB RubberDucky (hak5.com) firmware programming script. Cause typing is hard.☆20Updated 11 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆35Updated 8 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆54Updated 4 years ago
- Use hashcat to crack WPA2 PSK (Pre-Shared Key) passwords!☆78Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆37Updated 4 years ago
- Remote Administration Tool for Windows☆19Updated 10 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Updated 7 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆37Updated 9 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 7 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Package manager for hackers built by hackers☆36Updated 7 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 9 years ago
- hackpack to go with lazykali on menu application Kali Linux☆30Updated 11 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆47Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆36Updated 9 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Updated 8 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆43Updated 8 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago