jeanphorn / wordlist
Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passwords.
☆1,616Updated 2 years ago
Alternatives and similar repositories for wordlist
Users that are interested in wordlist are comparing it to the libraries listed below
Sorting:
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,243Updated this week
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,867Updated 2 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,815Updated 3 years ago
- Find exploits in local and online databases instantly☆1,733Updated 3 years ago
- Git All the Payloads! A collection of web attack payloads.☆3,772Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,056Updated 7 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,251Updated this week
- Advanced dork Search & Mass Exploit Scanner☆1,466Updated 9 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- CeWL is a Custom Word List Generator☆2,228Updated 6 months ago
- Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications…☆1,307Updated 8 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,344Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆3,056Updated 9 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,639Updated 3 weeks ago
- Striker is an offensive information and vulnerability scanner.☆2,279Updated last year
- Next generation web scanner☆5,864Updated 10 months ago
- File upload vulnerability scanner and exploitation tool.☆3,201Updated last week
- Weaponized web shell☆3,298Updated 7 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,735Updated 3 months ago
- Automatically brute force all services running on a target.☆2,076Updated 8 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,309Updated 7 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,792Updated 3 years ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,366Updated 5 months ago
- offsec batteries included☆1,560Updated last year
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,514Updated last year
- Miscellaneous exploit code☆1,551Updated last year
- Advanced reconnaissance utility☆974Updated last year
- Advanced vulnerability scanning with Nmap NSE☆3,609Updated 8 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,720Updated 3 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,097Updated last year