hackingyseguridad / diccionariosView external linksLinks
Diccionarios de: usuarios, passwords, XSS, ficheros, carpetas, dorks, etc .. ( hackingyseguridad.com )
☆150Feb 6, 2026Updated last week
Alternatives and similar repositories for diccionarios
Users that are interested in diccionarios are comparing it to the libraries listed below
Sorting:
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- script para hackear facebook por fuerza bruta!!!... necesita tener un diccionarios de datos y el correo de la victima☆25May 13, 2024Updated last year
- Usar fuerza bruta para acceder a la contraseña correcta☆31Apr 27, 2018Updated 7 years ago
- git clone --depth=1 https://github.com/htr-tech/zphisher.git☆12Nov 25, 2022Updated 3 years ago
- Script hecho en bash para realizar un ataque de fuerza bruta a un usuario de un sistema Linux.☆62May 8, 2024Updated last year
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆22Apr 27, 2025Updated 9 months ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆12Jul 20, 2024Updated last year
- Una herramienta de phishing avanzada enfocada a hackear cuentas de facebook mediante phishing. Facehack te permite personalizar la pagin…☆20Oct 26, 2021Updated 4 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- This document contains a list of tools and platforms that allow for GEOINT analysis focused on Colombia.☆18Oct 8, 2024Updated last year
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Facebook Bruteforce tool on python 🔐☆15Oct 14, 2024Updated last year
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆17Jan 8, 2021Updated 5 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- USB multiplexing client, compatible with Python 2/3, which allows for SSH over USB to jailbroken iOS devices and more.☆16May 18, 2020Updated 5 years ago
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Dec 1, 2025Updated 2 months ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆20Jan 16, 2019Updated 7 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Python proof-of-concept for breaking passwords with a microphone, using machine learning.☆22Dec 29, 2019Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 4 years ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Jul 29, 2024Updated last year
- A Next-Gen Wordpress Hacker Backend☆19May 27, 2018Updated 7 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Contenido de herramientas OSINT con Docker. Tambien nos podes visitar en el canal de youtube (https://www.youtube.com/user/marcospr74/)☆19Jan 4, 2021Updated 5 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- ☆17Mar 21, 2019Updated 6 years ago
- This repository contains the mobile Proof of Concept (POC) tester for CTF challenges. The POC tester is a web application that allows use…☆20Oct 3, 2025Updated 4 months ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Sep 25, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Brute force tool for telnet and ssh, programmed in python (with Zmap)☆13Jul 3, 2019Updated 6 years ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- Generador de servidores ssh locales y públicos.☆19Oct 4, 2020Updated 5 years ago