StayPirate / Single-Seed-Wordlist-GeneratorLinks
Generates several passwords based on one single word, like a company's name.
☆26Updated 3 years ago
Alternatives and similar repositories for Single-Seed-Wordlist-Generator
Users that are interested in Single-Seed-Wordlist-Generator are comparing it to the libraries listed below
Sorting:
- Hash cracking WebApp & Server for hashcat☆46Updated 3 years ago
- Docker images for learning wifi hacking☆69Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆71Updated 8 months ago
- Dump of all my hash-cracking related stuffs.☆23Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Custom password cracking rules for Hashcat and John the Ripper☆89Updated 11 months ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- wordlists for password cracking☆28Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A new web frontend for Hashtopolis☆35Updated this week
- Detect & filter duplicate hashcat rules☆45Updated 6 months ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Team hashcat event writeups and tools☆50Updated last week
- Command line interface to interact with hashes.com escrow service.☆37Updated 3 weeks ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆105Updated 6 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 3 years ago
- A tool to Terraform and automate password cracking on AWS.☆84Updated 5 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆51Updated 5 years ago
- Legba recipes.☆50Updated 11 months ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- brute force SSH public-key authentication☆77Updated 2 months ago
- LetMeHID is a tool that generates Windows HID payloads to obtain bind or reverse access using Raspberry PI0 and P4wnP1 A.L.O.A.☆53Updated 5 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago