TheNittam / Pass2PwnLinks
Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name. Although Pass2Pwn does not have the capacity to generate as many passwords as other tools, I have attempted to implement a mechanism that generates passwords using the most common pass…
☆11Updated 2 years ago
Alternatives and similar repositories for Pass2Pwn
Users that are interested in Pass2Pwn are comparing it to the libraries listed below
Sorting:
- ☆17Updated 11 months ago
- ☆15Updated 4 years ago
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆20Updated 3 years ago
- FbUID is a tool written in bash to help people extract userID from public Facebook Profiles when username is known.☆17Updated 4 years ago
- Real-time XSS Detection Suite!☆33Updated 3 years ago
- Enumerate most common password patterns with custom keyword.☆10Updated 2 years ago
- ☆35Updated 4 years ago
- hacking-resources☆4Updated 3 years ago
- List of every possible vulnerabilities in computer security.☆67Updated 2 years ago
- recon from myerspective☆47Updated 2 years ago
- ☆30Updated 3 years ago
- 30 Days of PHP source code analysis☆16Updated 2 years ago
- Resources that help you learn the fundamentals of ethical hacking.☆48Updated 3 years ago
- [ PLEASE DON'T USE THIS REPO ] Hacktoberfest 2020 movement to list out all the open source enthusiasts in one place. Want to make your PR…☆41Updated 3 years ago
- Binit Ghimire | I am a Tech Enthusiastic full-stack web developer, programmer and web/network penetration tester from Nepal.☆8Updated 4 years ago
- Reflector: A tool to check for reflected query parameter values.☆12Updated 2 years ago
- A Crypto-CTF Assistant For Saving You Time☆17Updated 3 years ago
- ☆39Updated 2 weeks ago
- ☆50Updated 4 years ago
- Open Redirect Payloads☆28Updated 3 years ago
- ☆28Updated 3 years ago
- A curated list of daily learnings, writeups, blogs, tips and everything related to hacking☆12Updated 2 years ago
- Power of .bashrc and .bash_aliases☆30Updated 2 years ago
- A simple node.js app to scrape list of notices and notice content from Pokhara Univerity's website☆9Updated 2 years ago
- ☆96Updated 2 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆37Updated 9 months ago
- Relative Path Overwrite Vulnerability Scanner☆22Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆90Updated 3 years ago
- Quick and dirty script to check for No RL☆30Updated 4 months ago
- ☆88Updated 6 years ago