Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
☆30Dec 18, 2023Updated 2 years ago
Alternatives and similar repositories for wordlist-generator
Users that are interested in wordlist-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Oct 1, 2020Updated 5 years ago
- Simple WordList Generator (GUI)☆13Jan 13, 2020Updated 6 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- This application is designed to help users recover lost or forgotten data such as Wi-Fi passwords, browser data, browser passwords, and o…☆41Mar 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆23Jun 12, 2021Updated 4 years ago
- ☆30May 8, 2023Updated 3 years ago
- A bootkit to bypass Windows login (WIP)☆10Oct 25, 2023Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- Unofficial Android client for kemono and coomer☆62Updated this week
- Keylogger builder written in C#☆12Jul 13, 2022Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Attempt to search unsolved 84 puzzles keys of 1000 BTC☆28Jun 27, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- XSS (Cross Site Scripting) attack is performed on a website of Bank Management System using Kali Linux and Burp Suite☆10Aug 25, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 5 months ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 4 months ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 3 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Watch live SMTP traffic in a web interface.☆18Mar 18, 2026Updated 2 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Mar 16, 2026Updated 2 months ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- A large collection of useful .lua scripts for GameGuardian.☆24Aug 26, 2023Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- A Ruby micro-framework for writing and running exploits☆81Jan 15, 2026Updated 4 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆43Sep 6, 2024Updated last year
- All things to do after installing Kali Linux and Add more awesome hacking tools to your Kali Linux system☆13Jul 6, 2017Updated 8 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆75Nov 12, 2024Updated last year
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 4 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python library for the https://mega.nz/ API.☆13Feb 13, 2024Updated 2 years ago
- Simple and powerful extension for searching web and viewing website content.☆14Apr 11, 2025Updated last year
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- Use comboclean to make it easy to use email and passwords, from big combolists, in your script.☆15Aug 27, 2021Updated 4 years ago
- A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.☆15Nov 20, 2021Updated 4 years ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- Speed up secp256k1 with endomorphism☆14Dec 7, 2022Updated 3 years ago