hasherezade / jpassword_scrambler
Small utility to generate complicated passwords - version with GUI
☆18Updated 7 years ago
Alternatives and similar repositories for jpassword_scrambler:
Users that are interested in jpassword_scrambler are comparing it to the libraries listed below
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Various scripts helpful in sorting collections of malware samples.☆37Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago