StayPirate / Single-Seed-Wordlist-Generator
Generates several passwords based on one single word, like a company's name.
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Single-Seed-Wordlist-Generator
- Detect & filter duplicate hashcat rules☆41Updated 2 years ago
- autocrack adds queue support for hashcat cracking.☆42Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆36Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆23Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Haschcat Rules processor☆13Updated last year
- Dump of all my hash-cracking related stuffs.☆23Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Selenium based web scraper to generate passwords list☆50Updated 4 years ago
- FETCH THE PASSWORD STRETCHER☆33Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆23Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆35Updated 3 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- Merge multiple nMap xml files into one☆49Updated 5 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 3 years ago
- recon-ng modules for Censys☆36Updated last year
- Modern problems require modern solutions☆31Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆100Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- ☆40Updated 3 years ago