crunchsec / crunch
crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/
☆215Updated 6 years ago
Alternatives and similar repositories for crunch:
Users that are interested in crunch are comparing it to the libraries listed below
- Terminator metasploit payload generator☆177Updated 6 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 7 months ago
- Linux bash script automation for metasploit☆261Updated 5 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆353Updated 4 years ago
- Fud Payload generator script☆240Updated 5 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆436Updated 5 years ago
- DMitry (Deepmagic Information Gathering Tool)☆212Updated 7 months ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆373Updated 5 years ago
- Inject malicious code into *.debs☆273Updated 2 years ago
- Git all your favorite tools in one click☆263Updated 3 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆362Updated 7 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆253Updated 4 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆288Updated 7 years ago
- Easy way to brute-force web directory.☆148Updated 5 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆193Updated 6 years ago
- metasploitHelper☆246Updated 4 years ago
- ☆281Updated 10 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆727Updated 2 weeks ago
- Tools for information gathering☆337Updated 9 months ago
- Hacking systems with the automation of PasteJacking attacks.☆394Updated 4 months ago
- Find your wireless network password in Windows , Linux and Mac OS☆346Updated 4 years ago
- ☆117Updated 7 years ago
- XCTR Hacking Tools☆38Updated 3 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆155Updated 3 years ago
- transform your payload.exe into one fake word doc (.ppt)☆464Updated 5 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- Multiplatform payload dropper☆268Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆269Updated 7 years ago