berzerk0 / Probable-Wordlists
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
☆8,685Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Probable-Wordlists
- CTF framework and exploit development library☆12,099Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,517Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,444Updated 4 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,573Updated 3 weeks ago
- Web application fuzzer☆5,954Updated 2 months ago
- Automated Mass Exploiter☆5,031Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,591Updated this week
- Official Black Hat Arsenal Security Tools Repository☆3,897Updated 2 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,445Updated 7 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆3,924Updated 3 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆58,351Updated this week
- Nikto web server scanner☆8,579Updated last week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,233Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13,509Updated 2 weeks ago
- Advanced vulnerability scanning with Nmap NSE☆3,467Updated last month
- Know the dangers of credential reuse attacks.☆2,020Updated 3 weeks ago
- NSE script based on Vulners.com API☆3,219Updated 7 months ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆10,279Updated this week
- Exploitation Framework for Embedded Devices☆12,193Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11,900Updated 4 years ago
- Weaponized web shell☆3,188Updated 3 weeks ago
- Next generation web scanner☆5,542Updated 3 months ago
- A swiss army knife for pentesting networks☆8,438Updated 11 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,150Updated last month
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,735Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,074Updated 3 weeks ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,755Updated 4 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,777Updated 6 months ago
- Attack Surface Management Platform☆8,077Updated 2 weeks ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,000Updated last year