Banco de dados de senhas
☆104Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for wordlist
Users that are interested in wordlist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ferramenta de Reconhecimento para Pentest☆15Jul 24, 2021Updated 4 years ago
- ☆19Jun 19, 2025Updated 9 months ago
- Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.☆17Oct 13, 2022Updated 3 years ago
- ☆14Jun 22, 2022Updated 3 years ago
- Painel de consultas completas de código aberto☆23Dec 12, 2021Updated 4 years ago
- Git-eXposed is a tool designed to detect and extract sensitive information from exposed Git repositories☆11Sep 26, 2024Updated last year
- Wordlists based on Brazilian passwords and dictionaries.☆177May 30, 2016Updated 9 years ago
- Ataque DDos☆63Dec 9, 2021Updated 4 years ago
- ☆58Apr 30, 2025Updated 10 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated 2 years ago
- Brute force para senhas linux☆46Jan 11, 2023Updated 3 years ago
- Code in the Book!☆11Oct 15, 2018Updated 7 years ago
- Android Crypter/Decrypter App Generator☆51Dec 12, 2018Updated 7 years ago
- The most powerfull Web Content Scanner☆123Jun 18, 2025Updated 9 months ago
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated last month
- Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve☆15Jul 16, 2022Updated 3 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- Programa Hackers do Bem☆11Apr 17, 2024Updated last year
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- Chan-vy é um script que baixa o código-fonte de todas as ferramentas disponíveis no Kali Linux, direto dos seus repositórios oficiais e d…☆12Feb 5, 2024Updated 2 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Free eBooks related to Ethical Hacking and Security☆11Jan 14, 2019Updated 7 years ago
- Convert kindle and other ebooks to png and pdf file by taking screenshots and merging it into a pdf.☆13Mar 2, 2022Updated 4 years ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆16Jan 8, 2026Updated 2 months ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- ☆16Aug 13, 2022Updated 3 years ago
- Consulte CPF, retornando todos os dados.☆42Jul 24, 2021Updated 4 years ago
- Black Hat Python, 2nd Edition - Justin Seitz & Tim Arnold☆11Mar 18, 2021Updated 5 years ago
- Ferramenta para busca automática de sites da Rede Onion☆10Mar 31, 2020Updated 5 years ago
- lofi-sounds☆18Aug 21, 2023Updated 2 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- ANY.RUN sandbox detection collection☆22Aug 21, 2024Updated last year
- This repository contains DDOS scripts☆11Jan 17, 2020Updated 6 years ago
- Interacting with Cisco FTD devices via the FDM REST API in Python☆12Feb 6, 2022Updated 4 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks☆37Feb 20, 2024Updated 2 years ago
- A customized mixed PT-BR wordlist for pentesting purposes.☆14Apr 14, 2019Updated 6 years ago
- Free Security and Hacking eBooks☆23Jan 1, 2018Updated 8 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆47Mar 22, 2017Updated 9 years ago