J4NN0 / wordlist-generatorLinks
Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
☆32Updated last year
Alternatives and similar repositories for wordlist-generator
Users that are interested in wordlist-generator are comparing it to the libraries listed below
Sorting:
- Fast exploitation based on metasploit.☆74Updated 5 years ago
 - Keylogger using pynput + mail sender☆54Updated 5 years ago
 - Find exploits in local and online database☆78Updated last year
 - !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
 - All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.☆86Updated 10 months ago
 - SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
 - Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
 - Python Script to help/automate the WiFi hacking exercises.☆87Updated 4 years ago
 - Generate Malicious QR or similar☆16Updated 2 years ago
 - Facebook bot dumper&scraper☆38Updated last year
 - Fsociety Phishing Tool☆19Updated last year
 - Hatch is a brute force tool that is used to brute force most websites☆84Updated last year
 - A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆61Updated 4 years ago
 - Binaries Payloads Web Payloads Scripting Payloads Shellcode☆39Updated 7 years ago
 - HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directory☆85Updated 3 years ago
 - Wi-Fi-Jammer Using Python Script As BlackHat☆93Updated 4 years ago
 - Rogue access point tool.☆59Updated 3 years ago
 - Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆44Updated 4 years ago
 - Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆17Updated 4 years ago
 - Send anonymous text messages with TOR and the TextBelt API☆68Updated 4 years ago
 - This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
 - Easy Mac Changer - Change your MAC Address (EASIER and FASTER than EVER)☆75Updated 6 years ago
 - python script that hide phishing url like a pro "masking url technique"☆44Updated 4 years ago
 - #Just simple program to spoofing device by sending malicious link☆29Updated 3 years ago
 - BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆57Updated 7 years ago
 - A very flexible phone number wordlist generator☆69Updated last year
 - Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆28Updated 5 years ago
 - Hackerinfo infromations Web Application Security☆74Updated 2 years ago
 - Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆111Updated 3 years ago
 - WEB SQLi Injection DB Dumper DATA Hacking Tool☆61Updated 6 years ago