intelligencegroup-io / RockYou2024
RockYou2024 10 billion passwords leaked in the largest compilation of all time
☆277Updated 6 months ago
Alternatives and similar repositories for RockYou2024:
Users that are interested in RockYou2024 are comparing it to the libraries listed below
- Magnet Link for Downloading☆230Updated 7 months ago
- Fork from @rsmudge/armitage☆128Updated 2 years ago
- Phishing with a fake reCAPTCHA☆473Updated 5 months ago
- Repo containing cracked red teaming tools.☆147Updated 7 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆204Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste …☆163Updated 8 months ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆60Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆238Updated last year
- WiFi Penetration Testing & Auditing Tool☆462Updated 3 weeks ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆354Updated last year
- ☆285Updated 8 months ago
- zerosum0x0's Koadic☆279Updated 3 years ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆403Updated 11 months ago
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆234Updated last year
- Search & Parse Password Leaks☆325Updated 4 months ago
- NetProbe: Network Probe☆153Updated 4 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆508Updated 6 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆407Updated last year
- ☆530Updated 10 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆90Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆724Updated last month
- A Onion websites searcher☆267Updated last month
- Automated exploit scanner for cameras on the internet☆181Updated 11 months ago
- Quickly search the rockyou2024.txt file☆25Updated 6 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆95Updated last year
- Open-Source Phishing Toolkit☆147Updated 4 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆321Updated 4 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆237Updated 5 months ago
- ☆309Updated 10 months ago