Modular personalized dictionary generator.
☆213Aug 15, 2024Updated last year
Alternatives and similar repositories for Narthex
Users that are interested in Narthex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Password leak analysis program☆16Oct 1, 2022Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Mar 19, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ⛤Keylogger Generator for Windows written in Python⛤☆56Jun 9, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- ☆100Nov 10, 2021Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Dec 22, 2021Updated 4 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Install the tools and start Attacking , black-tool v5.5.5 ! ⬛☆603May 2, 2024Updated 2 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆58Dec 17, 2024Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 4 years ago
- Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)☆30Dec 18, 2023Updated 2 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆67Jul 10, 2024Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Highly configurable script for dictionary/spray attacks against online web applications.☆52Nov 8, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Apr 21, 2021Updated 5 years ago
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Mar 26, 2022Updated 4 years ago
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆101Jul 20, 2023Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. Implementation of ligolo-ng into sliver☆30Feb 27, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆89Feb 11, 2022Updated 4 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆18Aug 19, 2022Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- Generate users list using certain format☆23Jan 23, 2019Updated 7 years ago
- Verdict-as-a-Service SDKs: Analyze files for malicious content☆38Apr 27, 2026Updated last week