LandGrey / pydictorLinks
A powerful and useful hacker dictionary builder for a brute-force attack
☆3,548Updated 11 months ago
Alternatives and similar repositories for pydictor
Users that are interested in pydictor are comparing it to the libraries listed below
Sorting:
- Common User Passwords Profiler (CUPP)☆5,069Updated 2 years ago
- Next generation web scanner☆6,190Updated last month
- Veil 3.1.X (Check version info in Veil at runtime)☆4,174Updated 2 years ago
- CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs☆2,484Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,810Updated 6 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆3,191Updated 3 months ago
- Weaponized web shell☆3,416Updated last month
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,686Updated 3 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,731Updated last year
- Web path scanner☆13,679Updated last month
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,008Updated 2 months ago
- Automatically brute force all services running on a target.☆2,157Updated last year
- Webshell && Backdoor Collection☆1,958Updated 5 years ago
- venom - C2 shellcode generator/compiler/handler☆1,917Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,329Updated this week
- massive SQL injection vulnerability scanner☆1,226Updated 7 years ago
- jSQL Injection is a Java application for automatic SQL database injection.☆1,699Updated 3 weeks ago
- Web application fuzzer☆6,339Updated last year
- Attack Surface Management Platform☆9,230Updated last month
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,520Updated last week
- Crack hashes in seconds.☆1,848Updated 11 months ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,692Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,144Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,403Updated last year
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆822Updated 6 months ago
- Bruteforce database☆1,615Updated last week
- hydra☆11,213Updated last week
- Advanced vulnerability scanning with Nmap NSE☆3,688Updated last year
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,491Updated 3 months ago
- HackBar plugin for Burpsuite☆1,604Updated 4 years ago