Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security research.
☆100Feb 24, 2024Updated 2 years ago
Alternatives and similar repositories for lyricpass
Users that are interested in lyricpass are comparing it to the libraries listed below
Sorting:
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- 密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...☆168Jun 11, 2025Updated 8 months ago
- A very flexible phone number wordlist generator☆72Jun 21, 2024Updated last year
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,404Jul 13, 2025Updated 7 months ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆531Apr 17, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated last month
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 7 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 6 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 10 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- this tool can deploy malware using wifi that it can be downloaded by the user.☆13Dec 16, 2023Updated 2 years ago
- Provides a simple Python based proxy for running DNS over HTTPS to Google's DNS over HTTPS service.☆39Mar 10, 2025Updated 11 months ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Nov 17, 2017Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Jun 27, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆90Oct 18, 2019Updated 6 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago