crunchsec / crunch
crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/
☆216Updated 6 years ago
Alternatives and similar repositories for crunch:
Users that are interested in crunch are comparing it to the libraries listed below
- A friend of SQLmap which will do what you always expected from SQLmap.☆438Updated 5 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- DMitry (Deepmagic Information Gathering Tool)☆215Updated 8 months ago
- Git all your favorite tools in one click☆263Updated 3 years ago
- Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield☆460Updated 2 years ago
- Inject malicious code into *.debs☆273Updated 2 years ago
- this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , instal…☆362Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆722Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆375Updated 5 years ago
- Automatically exported from code.google.com/p/armitage☆540Updated 3 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆735Updated last week
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆224Updated 3 years ago
- Linux bash script automation for metasploit☆262Updated 5 years ago
- CMS auto detect and exploit.☆390Updated 2 years ago
- Uniscan web vulnerability scanner☆139Updated 3 years ago
- GUI frontend to John the Ripper password cracker☆563Updated last year
- SQL Injection Exploitation Tool☆750Updated 6 years ago
- Advanced reconnaissance utility☆968Updated last year
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Auto Scanning to SSL Vulnerability☆631Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆396Updated 5 months ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆254Updated 4 years ago
- SQLi scanner to detect SQL vulns☆199Updated 5 years ago
- A Simple Multi-Threaded SSH Brute Forcer☆270Updated 4 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Updated 2 years ago
- for mass exploiting☆602Updated 2 years ago
- Tools for information gathering☆340Updated 10 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago