TheNittam / Pass2Pwn
Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name. Although Pass2Pwn does not have the capacity to generate as many passwords as other tools, I have attempted to implement a mechanism that generates passwords using the most common pass…
☆11Updated last year
Alternatives and similar repositories for Pass2Pwn:
Users that are interested in Pass2Pwn are comparing it to the libraries listed below
- ☆17Updated 9 months ago
- ☆15Updated 3 years ago
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆20Updated 3 years ago
- Enumerate most common password patterns with custom keyword.☆10Updated 2 years ago
- Real-time XSS Detection Suite!☆33Updated 3 years ago
- Resources that help you learn the fundamentals of ethical hacking.☆47Updated 2 years ago
- hacking-resources☆1Updated 3 years ago
- FbUID is a tool written in bash to help people extract userID from public Facebook Profiles when username is known.☆17Updated 4 years ago
- recon from myerspective☆47Updated 2 years ago
- ☆35Updated 3 years ago
- [ PLEASE DON'T USE THIS REPO ] Hacktoberfest 2020 movement to list out all the open source enthusiasts in one place. Want to make your PR…☆40Updated 3 years ago
- Reject Angular and Bloated Web and embrace the power of CLI.☆20Updated 2 years ago
- List of every possible vulnerabilities in computer security.☆65Updated 2 years ago
- Resources for Learning Docker☆34Updated 2 years ago
- Binit Ghimire | I am a Tech Enthusiastic full-stack web developer, programmer and web/network penetration tester from Nepal.☆8Updated 3 years ago
- A complete collection of all the Tech Companies in Nepal.☆23Updated last year
- ☆38Updated 3 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆90Updated 3 years ago
- A Gatsby theme for techies who love terminal / command line / bash like portfolio.☆20Updated 3 years ago
- ☆30Updated 3 years ago
- A simple node.js app to scrape list of notices and notice content from Pokhara Univerity's website☆9Updated 2 years ago
- ☆105Updated last month
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated 7 months ago
- Quick and dirty script to check for No RL☆29Updated 2 months ago
- Open Redirect Payloads☆28Updated 3 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆36Updated 7 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Updated 4 years ago
- Curated List of Video Roadmap for becoming MERN FullStack Web Developer (from Beginning to Top)☆14Updated 2 years ago
- ☆28Updated 3 years ago
- Relative Path Overwrite Vulnerability Scanner☆22Updated 2 years ago