RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.
☆232Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for RSMangler
Users that are interested in RSMangler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,971Updated this week
- Username tools for penetration testing☆1,363Sep 20, 2024Updated last year
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- CeWL is a Custom Word List Generator☆2,645Updated this week
- Common User Passwords Profiler (CUPP)☆5,871Dec 26, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A unique automated LFi Exploiter with Bind/Reverse Shells☆308Jun 25, 2015Updated 10 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆18Jun 1, 2024Updated last year
- Advanced keyboard-walk generator with configureable basechars, keymap and routes☆600Aug 19, 2025Updated 8 months ago
- Extracts Key Values from .keytab files☆356Aug 26, 2020Updated 5 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆156Apr 20, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- socks4 reverse proxy for penetration testing☆645Jul 12, 2018Updated 7 years ago
- C# implementation of harmj0y's PowerView☆48Mar 22, 2020Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,942Nov 19, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,504Dec 19, 2023Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆614Feb 6, 2015Updated 11 years ago
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,660Jan 15, 2024Updated 2 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- A semi-interactive PHP shell compressed into a single file.☆1,061Feb 14, 2018Updated 8 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆135Aug 20, 2018Updated 7 years ago
- The DetectDynamicJS Burp Extension provides an additional passive scanner that tries to find differing content in JavaScript files and ai…☆13Dec 17, 2018Updated 7 years ago
- Standalone password candidate generator using the PRINCE algorithm☆486Oct 30, 2023Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,685Jan 5, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆352Oct 22, 2024Updated last year
- ☆252Sep 18, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,044Jul 11, 2024Updated last year
- A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.☆1,944Sep 5, 2023Updated 2 years ago
- Tool to audit and attack LAPS environments☆939Jan 31, 2018Updated 8 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,317Nov 22, 2022Updated 3 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆895Apr 8, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Wordlists for creating statistically likely username lists for use in password attacks and security testing. Used for pentesting for over…☆1,295Feb 16, 2026Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,421Jan 26, 2026Updated 2 months ago
- GitLab User Enumeration☆58Jan 3, 2025Updated last year
- PowerShell Pass The Hash Utils☆1,745Dec 9, 2018Updated 7 years ago
- This script will bruteforce the credential of tomcat manager or host-manager☆33Jun 24, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool☆2,032Jan 6, 2026Updated 3 months ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆164Jun 14, 2018Updated 7 years ago