TheNerdlist / nerdlist
list of passwords more likely to be used by sysadmins, general nerds, and folk with access
☆259Updated 3 months ago
Alternatives and similar repositories for nerdlist:
Users that are interested in nerdlist are comparing it to the libraries listed below
- ☆230Updated 5 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆475Updated 5 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Wiegotcha: Long Range RFID Thief☆233Updated 3 years ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆166Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- ☆199Updated 3 years ago
- Pastebin OSINT Harvester☆323Updated 5 years ago
- A memorial site for Hackers and Infosec people who have passed☆132Updated last week
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆301Updated 9 months ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Your Social Engineering Sidekick☆181Updated 2 years ago
- Get your APT on using social media as a tool for data exfiltration.☆147Updated 2 years ago
- Password spraying using AWS Lambda for IP rotation☆600Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- Issues to consider when planning a red team exercise.☆615Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆220Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 8 months ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆132Updated 2 months ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆232Updated 3 years ago
- penetration testing scripts☆136Updated 5 years ago
- Passive internal reconnaissance tool☆69Updated 2 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- DEF CON Hacker Tracker☆107Updated 2 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆551Updated 2 years ago