TheNerdlist / nerdlistLinks
list of passwords more likely to be used by sysadmins, general nerds, and folk with access
☆262Updated 2 months ago
Alternatives and similar repositories for nerdlist
Users that are interested in nerdlist are comparing it to the libraries listed below
Sorting:
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- ☆235Updated 6 years ago
- This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a …☆492Updated 6 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 10 months ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- DEF CON Hacker Tracker☆110Updated 3 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated last year
- internet monitoring osint telegram bot for windows☆154Updated 2 years ago
- LinkedIn reconnaissance tool☆55Updated 4 years ago
- ☆54Updated 5 years ago
- Learn you a book for some infosec good☆62Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆119Updated last year
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆100Updated 6 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆187Updated last year
- find out when and where someone is posting to reddit☆132Updated 6 years ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆44Updated 7 years ago
- Pastebin OSINT Harvester☆328Updated 6 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- An Ansible playbook to provision a host for penetration testing and CTF challenges☆231Updated 4 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Updated 3 years ago
- ☆313Updated last week
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- Slide Decks for the Majority of my Talks☆63Updated last year
- AI-based, context-driven network device ranking☆302Updated 2 years ago
- Resources for Building Virtual Machine Labs Live Training. YEET.☆127Updated 6 years ago
- food food food☆241Updated 2 months ago
- 3D reproduction of TSA Master keys☆71Updated 4 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆225Updated 5 years ago
- Scoring Engine for Red/White/Blue Team Competitions☆134Updated this week