TheNittam / Pass2Pwn
Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name. Although Pass2Pwn does not have the capacity to generate as many passwords as other tools, I have attempted to implement a mechanism that generates passwords using the most common pass…
☆11Updated last year
Alternatives and similar repositories for Pass2Pwn:
Users that are interested in Pass2Pwn are comparing it to the libraries listed below
- ☆17Updated 6 months ago
- ☆15Updated 3 years ago
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆20Updated 2 years ago
- FbUID is a tool written in bash to help people extract userID from public Facebook Profiles when username is known.☆17Updated 3 years ago
- Real-time XSS Detection Suite!☆33Updated 3 years ago
- ☆35Updated 3 years ago
- Enumerate most common password patterns with custom keyword.☆10Updated last year
- hacking-resources☆1Updated 3 years ago
- Resources that help you learn the fundamentals of ethical hacking.☆46Updated 2 years ago
- List of every possible vulnerabilities in computer security.☆62Updated 2 years ago
- recon from myerspective☆47Updated 2 years ago
- Resources for Learning Docker☆32Updated 2 years ago
- [ PLEASE DON'T USE THIS REPO ] Hacktoberfest 2020 movement to list out all the open source enthusiasts in one place. Want to make your PR…☆40Updated 3 years ago
- ☆38Updated 2 weeks ago
- Relative Path Overwrite Vulnerability Scanner☆22Updated 2 years ago
- A simple node.js app to scrape list of notices and notice content from Pokhara Univerity's website☆9Updated 2 years ago
- 30 Days of PHP source code analysis☆14Updated 2 years ago
- ☆27Updated 5 years ago
- ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, d…☆21Updated last year
- Google Dorks and keywords for bug hunters.☆13Updated 3 years ago
- ☆66Updated 4 years ago
- Prototype Pollution - A detailed study + hands on lab.☆15Updated 2 years ago
- Quick and dirty script to check for No RL☆29Updated 4 years ago
- Most of the Google Acquisitions for Bug Bounty Hunter.☆62Updated 2 years ago
- ☆127Updated 3 years ago
- My Notes & Resources Of Bug Bounty Checklists☆61Updated last month
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆16Updated 4 months ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆34Updated 4 months ago
- ☆10Updated 4 years ago
- ☆30Updated 3 years ago