halvtomat / swedish-passwordsLinks
Analysis of Swedish password usage
☆15Updated last year
Alternatives and similar repositories for swedish-passwords
Users that are interested in swedish-passwords are comparing it to the libraries listed below
Sorting:
- Shodan Dorks☆470Updated 10 months ago
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆64Updated 2 years ago
- Shodan Dorks☆526Updated 2 years ago
- An insane list of all dorks taken from everywhere from various different sources.☆749Updated last year
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆17Updated 8 months ago
- An advanced JavaScript reconnaissance tool for endpoints, secrets, and more☆13Updated 8 months ago
- recon for bug hunters☆854Updated last month
- Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App☆615Updated 4 months ago
- Here you can find mostly all disclosed h1 reports☆28Updated 3 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆78Updated 9 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- ☆410Updated 3 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆397Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆305Updated this week
- Bug Bounty Tools used on Twitch - Recon☆320Updated last year
- ☆240Updated 9 months ago
- A Modern Framework for Bug Bounty Hunting☆637Updated 10 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆319Updated 4 months ago
- list of usernames and email addresses for pentests☆169Updated 3 years ago
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆34Updated 7 months ago
- A quick bug bounty guide for beginners☆85Updated 7 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆313Updated 7 months ago
- ☆28Updated 5 years ago
- ☆24Updated 3 months ago
- SQL Injection Vulnerability Scanner made with Python☆379Updated 9 months ago
- Analyze your tryhackme progress!☆12Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆509Updated 3 weeks ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆504Updated 5 years ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆686Updated 3 weeks ago