RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.
☆231Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for RSMangler
Users that are interested in RSMangler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,969Nov 17, 2025Updated 4 months ago
- Username tools for penetration testing☆1,347Sep 20, 2024Updated last year
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- CeWL is a Custom Word List Generator☆2,611Updated this week
- Common User Passwords Profiler (CUPP)☆5,830Dec 26, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A unique automated LFi Exploiter with Bind/Reverse Shells☆301Jun 25, 2015Updated 10 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆598Aug 19, 2025Updated 7 months ago
- Extracts Key Values from .keytab files☆351Aug 26, 2020Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆153Apr 20, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- socks4 reverse proxy for penetration testing☆642Jul 12, 2018Updated 7 years ago
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,501Dec 19, 2023Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆611Feb 6, 2015Updated 11 years ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,652Jan 15, 2024Updated 2 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- A semi-interactive PHP shell compressed into a single file.☆1,055Feb 14, 2018Updated 8 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆131Aug 20, 2018Updated 7 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Standalone password candidate generator using the PRINCE algorithm☆481Oct 30, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,664Jan 5, 2026Updated 2 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆351Oct 22, 2024Updated last year
- ☆252Sep 18, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,033Jul 11, 2024Updated last year
- Tool to audit and attack LAPS environments☆930Jan 31, 2018Updated 8 years ago
- A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.☆1,939Sep 5, 2023Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,316Nov 22, 2022Updated 3 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆889Apr 8, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,279Feb 16, 2026Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,393Jan 26, 2026Updated 2 months ago
- GitLab User Enumeration☆56Jan 3, 2025Updated last year
- PowerShell Pass The Hash Utils☆1,742Dec 9, 2018Updated 7 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆2,025Jan 6, 2026Updated 2 months ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆162Jun 14, 2018Updated 7 years ago