crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/
☆240Dec 25, 2018Updated 7 years ago
Alternatives and similar repositories for crunch
Users that are interested in crunch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cewl wordlist generator from https://digi.ninja/projects/cewl.php☆29Jul 3, 2015Updated 10 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- the world famous rkhunter☆15Jul 3, 2015Updated 10 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆125Jun 12, 2019Updated 6 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- davtest (improved)- Exploits WebDAV folders☆120Mar 7, 2023Updated 3 years ago
- ☆17May 29, 2015Updated 10 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- [CVE_2023_28432漏洞 、CVE_2023_32315漏洞、 ThinkPHP 2.x 任意代码执行漏洞 、ThinkPHP5 5.0.22/5.1.29 远程代码执行漏洞、 ThinkPHP5 5.0.23 远程代码执行漏洞 ThinkPHP 多语言本地文件包…☆10Aug 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Jul 16, 2017Updated 8 years ago
- Web application fuzzer☆6,452Jan 21, 2026Updated 2 months ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- hydra☆11,740Feb 7, 2026Updated last month
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- Psiphon Browser for iOS☆17Sep 14, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Common User Passwords Profiler (CUPP)☆5,830Dec 26, 2025Updated 3 months ago
- Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)☆30Dec 18, 2023Updated 2 years ago
- Man-in-the-middle against Tor bridges☆28Feb 9, 2020Updated 6 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- ☆10Sep 20, 2017Updated 8 years ago
- archive of code from http://www.unicornscan.org/☆81Aug 28, 2012Updated 13 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Jul 28, 2020Updated 5 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 5 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Automated script for performing Padding Oracle attacks☆809Jul 13, 2024Updated last year