digininja / deleet
Take a word list and convert 1337 spellings back to normal
☆11Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for deleet
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 2 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆9Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Code snippets I find useful☆31Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 4 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Create lists from nmap output.☆13Updated 3 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago