Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python
☆55Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for WordListGen
Users that are interested in WordListGen are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- XSSRecon - Reflected XSS Scanner☆27Oct 7, 2020Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆74Nov 12, 2024Updated last year
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Dec 3, 2019Updated 6 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 2 months ago
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Sep 26, 2023Updated 2 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- A collection of scripts to run on a fresh install of kali linux☆36Feb 17, 2018Updated 8 years ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- Bilgisayarınıza yapılan ARP Spoofing saldırılarını tespit eden ARP Spoof Detector Scripti.☆13May 7, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- allows one to send and recieve messages via email address bypassing the normal text rates☆73Oct 9, 2018Updated 7 years ago
- Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)☆30Dec 18, 2023Updated 2 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- ITWSV- Integrated Tool for Web Security Vulnerability☆67Nov 28, 2019Updated 6 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆278Oct 29, 2018Updated 7 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 4 months ago
- A list of web application security☆92Sep 11, 2019Updated 6 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- A list of examples and references of hacking with Bash and the Curl command☆57Feb 27, 2020Updated 6 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago