StayPirate / Single-Seed-Wordlist-Generator
Generates several passwords based on one single word, like a company's name.
☆26Updated 3 years ago
Alternatives and similar repositories for Single-Seed-Wordlist-Generator:
Users that are interested in Single-Seed-Wordlist-Generator are comparing it to the libraries listed below
- Wireless Pentesting Device☆20Updated 4 years ago
- wordlists for password cracking☆27Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 6 years ago
- Legba recipes.☆48Updated 7 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆37Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Command List for Hashcat and default keyspaces.☆16Updated 5 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 6 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆24Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 6 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Automatically spin up infra for phishing☆63Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆29Updated 5 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- ☆41Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated last year