cewl wordlist generator from https://digi.ninja/projects/cewl.php
☆29Jul 3, 2015Updated 10 years ago
Alternatives and similar repositories for cewl
Users that are interested in cewl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17May 29, 2015Updated 10 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- ☆26May 7, 2016Updated 9 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- WinRemoteEnum is a module-based collection of operations achievable by a low-privileged domain user.☆13Oct 24, 2022Updated 3 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- ☆40May 29, 2015Updated 10 years ago
- ☆21Updated this week
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- Linux Local Enumeration Script☆79Jul 17, 2020Updated 5 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Hints, tips & scripts for our CTF participation efforts☆10Dec 2, 2014Updated 11 years ago
- AEON GUI☆14Jan 17, 2023Updated 3 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- OpenBox pipemenu for using xrandr☆16Jan 11, 2025Updated last year
- ☆12May 16, 2020Updated 5 years ago
- Recursively browse the filesystem through Openbox pipe menus (with icons).☆13Dec 21, 2025Updated 3 months ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- archive of code from http://www.unicornscan.org/☆81Aug 28, 2012Updated 13 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- ☆24Jul 13, 2024Updated last year
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆22Jul 6, 2021Updated 4 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- ☆12May 26, 2020Updated 5 years ago
- (DEPRECATED) source code to stylus.js packaged up as a ruby gem☆11Feb 25, 2019Updated 7 years ago