exploit-development / RockYou2024
RockYou2024 10 billion passwords leaked in the largest compilation of all time
☆238Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for RockYou2024
- Magnet Link for Downloading☆214Updated 4 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 5 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆189Updated 9 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆342Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆45Updated last year
- WiFi Penetration Testing & Auditing Tool☆405Updated 3 weeks ago
- Repo containing cracked red teaming tools.☆121Updated 4 months ago
- zerosum0x0's Koadic☆268Updated 2 years ago
- Official DeepSound repository migrated from jpinsoft.net. DeepSound is a freeware steganography tool and audio converter that hides secre…☆164Updated 7 months ago
- ☆117Updated 8 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆139Updated 5 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆370Updated 8 months ago
- CVE-2024-21413 PoC for THM Lab☆48Updated 8 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆331Updated 11 months ago
- ☆133Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆397Updated 5 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆369Updated 3 weeks ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆184Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆304Updated 2 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆235Updated 2 months ago
- POC Pdf-exploit builder on C#☆126Updated 8 months ago
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆304Updated this week
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 9 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 10 months ago
- IoT Camera Reconnaissance and Live Viewer☆131Updated 3 months ago
- Search & Parse Password Leaks☆293Updated last month
- Script for generating revshells☆454Updated 2 months ago
- ☆268Updated 5 months ago
- All-in-One Toolkit for BruteForce Attacks☆377Updated last month