ZkClown / GetPwd
It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info. (leet transformations and combinatory processing)
☆55Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for GetPwd
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆32Updated 3 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆18Updated 5 years ago
- Information gathering tool - OSINT☆33Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Metasploit Framework☆10Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- Simple Karma Attack☆66Updated 4 years ago
- A Directory Bruteforcing Tool That Makes Your Life Easier!☆16Updated last year
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆16Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆51Updated 6 years ago
- wifi attacks suite☆59Updated 4 years ago
- Automated Tools Pentest☆6Updated last year
- Generate word list by combining inputted words or by permutaing characters.☆13Updated 7 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆27Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 5 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆45Updated 8 months ago
- "PRinter Exploitation Toolkit" LAN automation tool☆197Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago