derv82 / werdyLinks
A set of Python scripts for generating, parsing, sorting, and saving wordlists.
☆50Updated 3 years ago
Alternatives and similar repositories for werdy
Users that are interested in werdy are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/hexorbase☆75Updated 8 years ago
- Small backdoor using cookie.☆64Updated 8 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 9 years ago
- Some wordpress user enumeration scripts.☆38Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Useful pentesting scripts☆83Updated 8 months ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Simple Webshell Scanner☆52Updated 10 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- Red Login: SSH Brute-force Tools☆105Updated 7 years ago
- Massive arsenal of hacker tools...☆80Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Prints the IPs on your local network that're sending the most packets☆151Updated 4 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- Recursively searches a directory for any file containing a specified string☆46Updated 10 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆85Updated 11 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Autosploit = Automating Metasploit Modules.☆78Updated 6 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Search drives for documents containing passwords☆63Updated 11 years ago