cewl wordlist generator from https://digi.ninja/projects/cewl.php
☆29Jul 3, 2015Updated 10 years ago
Alternatives and similar repositories for cewl
Users that are interested in cewl are comparing it to the libraries listed below
Sorting:
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- ☆17May 29, 2015Updated 10 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- ☆24Jul 13, 2024Updated last year
- oneliner is a tool that gives a list of compatible reverse-shell-string oneliners☆24Jul 30, 2016Updated 9 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 7 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- ☆26May 7, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Linux Local Enumeration Script☆79Jul 17, 2020Updated 5 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Read stream implementation for DynamoDB☆10Aug 3, 2021Updated 4 years ago
- Data sets for R Graphics Cookbook☆10Mar 26, 2025Updated 11 months ago
- ☆54Jul 1, 2012Updated 13 years ago
- A repository to store all of my cheat sheets for various things.☆12Nov 21, 2025Updated 3 months ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- ☆14Jun 22, 2018Updated 7 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- dirb is a system for creating, managing and searching complex directory structures☆10Dec 12, 2015Updated 10 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year