halvtomat / swedish-passwordsLinks
Analysis of Swedish password usage
☆14Updated last year
Alternatives and similar repositories for swedish-passwords
Users that are interested in swedish-passwords are comparing it to the libraries listed below
Sorting:
- ☆23Updated 4 months ago
- Shodan Dorks☆440Updated 6 months ago
- recon for bug hunters☆788Updated 3 months ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆12Updated 9 months ago
- ☆27Updated 4 years ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆58Updated 2 years ago
- An insane list of all dorks taken from everywhere from various different sources.☆694Updated 9 months ago
- A quick bug bounty guide for beginners☆81Updated 4 months ago
- Shodan Dorks☆506Updated 2 years ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆205Updated 3 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Here you can find mostly all disclosed h1 reports☆27Updated 3 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆365Updated 11 months ago
- Bug Bounty Tools used on Twitch - Recon☆308Updated 11 months ago
- Bookmarklet to find endpoints easily with one click☆62Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 5 months ago
- Autofill Phishing☆75Updated last week
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆16Updated 5 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆298Updated 2 weeks ago
- A Modern Framework for Bug Bounty Hunting☆619Updated 6 months ago
- ☆399Updated 3 years ago
- Here are the most interesting Shodan dorks (according to me)☆84Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆95Updated 2 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆75Updated 5 months ago
- list of usernames and email addresses for pentests☆137Updated 3 years ago
- SQL Injection Vulnerability Scanner made with Python☆369Updated 5 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆53Updated 5 months ago
- Bug Bounty Hunting Framework Designed to Help Beginners Compete w/ the Pros☆282Updated last week
- Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App☆568Updated last month
- GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to det…☆49Updated 5 months ago