clem9669 / wordlists
Various wordlists FR & EN - Cracking French passwords
☆281Updated this week
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- Rule for hashcat or john. Aiming to crack how people generate their password☆435Updated 8 months ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆476Updated 6 months ago
- Zero Infrastructure Password Cracking☆404Updated 8 months ago
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆116Updated last month
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆128Updated 6 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆96Updated 4 months ago
- large hashcat rulesets generated from real-world compromised passwords☆395Updated 4 years ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆510Updated 9 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆367Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- ☆93Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆293Updated 10 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆117Updated 8 years ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆346Updated last month
- Dirty python script to munge dictionary words into password.☆67Updated 5 months ago
- Script for generating revshells☆469Updated 7 months ago
- A web front-end for password cracking and analytics☆376Updated this week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆270Updated 2 months ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆87Updated last year
- Frack - Keep and Maintain your breach data☆348Updated 8 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆524Updated last year
- A mostly-serverless distributed hash cracking platform☆570Updated this week
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆401Updated 11 months ago
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆496Updated this week
- Open-Source Phishing Toolkit☆184Updated 6 months ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,121Updated 9 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,535Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- List of the most common French passwords☆361Updated last year
- Perfect wordlist for discovering directories and files on target site☆298Updated last year