Creates date-based wordlists that can be used for penetration testing, QA fixtures, or any workflow that needs exhaustive date coverage.
☆16Oct 29, 2025Updated 4 months ago
Alternatives and similar repositories for Chronogen
Users that are interested in Chronogen are comparing it to the libraries listed below
Sorting:
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- ☆12Oct 31, 2022Updated 3 years ago
- A redesigned ErgoDox keyboard☆12Sep 1, 2020Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- Config for HP Elitebook Hackintosh for macOS Sierra 10.13.2.☆16Jan 12, 2018Updated 8 years ago
- Extract the best title value from within HTML head elements.☆17Apr 17, 2023Updated 2 years ago
- Pwny Cup 2K24 quals challenges writeups☆13Nov 9, 2024Updated last year
- Kubernetes Security Posture Management☆15Nov 5, 2024Updated last year
- A collection of tools to read/write NFC ST SRI512 and SRIX4K tags.☆16Feb 6, 2021Updated 5 years ago
- PMKID Attack Module for the WiFi Pineapple☆18Jul 14, 2023Updated 2 years ago
- Collection of tools that might help Persian translators.☆12Dec 31, 2023Updated 2 years ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Java + Native 全自动 SSL Pinning 绕过脚本(Universal SSL Pinning Bypass Script (Java & Native Combined))☆43Jul 1, 2025Updated 8 months ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- A Python script to find tenant id an region from a list of domain names.☆16Jan 31, 2025Updated last year
- All about subdomain enumeration☆16Feb 5, 2019Updated 7 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Arduino sketch for the Open Grade Simulator - an open hardware and software incline simulator for indoor cycle training☆18May 19, 2021Updated 4 years ago
- Python script that converts Grafana hash digests to PBKDF2_HMAC_SHA256 format in order to facilitate password cracking using Hashcat.☆26Oct 24, 2021Updated 4 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 9 months ago
- Tansu - Bringing open source software development to the Stellar blockchain☆28Feb 25, 2026Updated last week
- Get a reverse shell using PostgreSQL☆20Aug 16, 2024Updated last year
- Material do curso de Hardware Hacking da ACADITI☆23Jan 13, 2020Updated 6 years ago
- This Lab contain the sample codes Basic Labs related to Server-Side Request Forgery attack☆21Nov 13, 2020Updated 5 years ago
- Javascript keylogger with web panel☆20Dec 12, 2023Updated 2 years ago
- GNOME Shell extension to easily manage usual snap tasks☆12May 28, 2022Updated 3 years ago
- This simple code snippet is used for brute force android apps with 4º digits passwords☆18Jan 17, 2019Updated 7 years ago
- Example Cross Site Request Forgery (CSRF) vulnerabilities in action.☆19Feb 20, 2017Updated 9 years ago
- Make DOS attacks android and other bluetooth devices☆18Feb 7, 2016Updated 10 years ago
- Social Lab is NOT a real social network. It is a social engineering wargame.☆25Jan 6, 2014Updated 12 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Burp extention to automatically generate OpenAPI Json for Swagger from proxy traffic☆22Aug 3, 2022Updated 3 years ago