edoardottt / longtongue
Customized Password/Passphrase List inputting Target Info
β84Updated 3 months ago
Alternatives and similar repositories for longtongue:
Users that are interested in longtongue are comparing it to the libraries listed below
- Evildork targeting your fianceeποΈβ85Updated last year
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Pythonβ51Updated 4 years ago
- Hit valid URLβ22Updated 3 years ago
- Complete Automated pentest framework for Information Gatheringβ38Updated 5 years ago
- β69Updated last year
- Wi-Fi Exploit Toolβ53Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β86Updated 11 months ago
- [ Automated Web Vulnerability Scanner ]β68Updated 4 years ago
- An OSINT focused tool made with Nodejs!β93Updated 2 years ago
- π΄ββ οΈ tools (py3 version) of Black Hat Python book π΄ββ οΈβ120Updated 3 months ago
- Automated rogue access point setup tool.β192Updated 3 years ago
- Arkhota, a web brute forcer for Android.β20Updated 2 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalitiesβ48Updated last year
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated toolβ38Updated 6 months ago
- An Encrypted File transfer via AES-256-CBCβ48Updated 3 years ago
- Python API wrapper for DarkSearch (darksearch.io).β34Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.β70Updated 3 years ago
- Apache Tomcat Manager API WAR Shell Uploadβ31Updated 4 years ago
- Simple Bash Script For Collecting Wordpress Usernameβ22Updated 4 years ago
- Collection of extra pentest tools for Kali Linuxβ104Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web applβ¦β26Updated 2 years ago
- β19Updated 6 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ37Updated 2 years ago
- Top password lists generated from leaks collected from different paste sitesβ30Updated 2 years ago
- Ultimate Recon Software for Information Gatheringβ96Updated 4 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into coβ¦β20Updated 2 years ago
- A very flexible phone number wordlist generatorβ64Updated 8 months ago
- π Devploit v 2.3 Information Gathering Toolπ΅οΈβ14Updated 6 years ago
- β27Updated 2 years ago