florianges / UsernameGenerator
Simple username generator based on a list of name and surname
☆12Updated 3 years ago
Alternatives and similar repositories for UsernameGenerator:
Users that are interested in UsernameGenerator are comparing it to the libraries listed below
- Tools used for Pentesting☆22Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- ☆24Updated 5 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆18Updated 7 months ago
- Enumeration & fingerprint tool☆24Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Mind Maps for penetration testing☆19Updated 4 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 4 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆14Updated 10 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- Challenge Python☆19Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- ☆53Updated 2 years ago
- ☆29Updated 3 years ago
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- New Framework Red Team Operations☆17Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated 3 months ago
- ☆14Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- ☆19Updated 11 months ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 7 months ago
- ☆18Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 5 months ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆23Updated last year
- ☆29Updated 3 years ago