clem9669 / wordlists
Various wordlists FR & EN - Cracking French passwords
☆274Updated this week
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- Rule for hashcat or john. Aiming to crack how people generate their password☆428Updated 5 months ago
- Zero Infrastructure Password Cracking☆399Updated 6 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆437Updated 4 months ago
- large hashcat rulesets generated from real-world compromised passwords☆394Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- A Zphisher GUI Back-Office Plugin☆212Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆110Updated last month
- OSINT tool to find informations about a github user (email2username, username2email, creation date ...)☆148Updated 2 weeks ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆88Updated 2 months ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆510Updated 6 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆120Updated last year
- GVision is a reverse image search app that use Google Cloud Vision API to detect landmarks and web entities from images, helping you gath…☆246Updated 2 months ago
- A python tool to automate KeePass discovery and secret extraction.☆464Updated 2 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆336Updated 7 months ago
- Powershell commands for enumeration in Windows Active Directory environment.☆38Updated 2 years ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆380Updated 2 years ago
- Dirty python script to munge dictionary words into password.☆65Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- Username tools for penetration testing☆937Updated 5 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆158Updated 8 months ago
- A python implementation of doyensec/Session-Hijacking-Visual-Exploitation☆41Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,262Updated 6 months ago
- A web front-end for password cracking and analytics☆365Updated this week
- Uncover the full name of a target on Linkedin.☆158Updated 2 years ago
- Send phishing messages and attachments to Microsoft Teams users☆1,055Updated 8 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆237Updated 5 months ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆446Updated 4 years ago
- ☆310Updated 10 months ago
- Script for generating revshells☆461Updated 5 months ago
- Many Evilginx2 Phishlets Uptodate☆49Updated last year