Zythom / french-wikipedia-word-list
☆21Updated 3 years ago
Alternatives and similar repositories for french-wikipedia-word-list:
Users that are interested in french-wikipedia-word-list are comparing it to the libraries listed below
- ☆17Updated 4 years ago
- Command line tool to get CVE useful info from any web report using the NVD database (NIST). Time saver for analysts.☆41Updated last month
- DEbian Cve REproducer Tool☆22Updated last year
- Check robustness of your (their) Active Directory accounts passwords☆34Updated 9 months ago
- Haschcat Rules processor☆13Updated last year
- wordlists for password cracking☆25Updated 2 years ago
- A VS Code extension to preview XML nmap output☆44Updated 11 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆58Updated 3 months ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Collection of some personal markdown resources☆22Updated 5 years ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- ☆17Updated 9 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- petit programme marrant☆16Updated 4 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- self-hosted Azure OSINT tool☆25Updated 4 months ago
- An Evil OIDC Server☆51Updated 2 years ago
- ☆33Updated 3 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆21Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- C# User Simulation☆32Updated 2 years ago
- Top hashpwn rules☆17Updated last month
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Detect & filter duplicate hashcat rules☆41Updated this week
- A mini project to exfiltrate data via QR codes☆19Updated last month
- Extract, gather and analyze information from an Android Manifest file or an APK.☆19Updated last year