k4m4 / dymerge
π A dynamic dictionary merger for successful dictionary based attacks.
β224Updated 3 years ago
Alternatives and similar repositories for dymerge:
Users that are interested in dymerge are comparing it to the libraries listed below
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β436Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β328Updated 6 months ago
- Linux bash script automation for metasploitβ260Updated 5 years ago
- Multiplatform payload dropperβ263Updated 3 years ago
- Advanced Hash Manipulationβ175Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ283Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β600Updated 3 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosβ289Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)β463Updated 5 years ago
- information gathering via dorksβ381Updated 2 years ago
- search for hosts info with shodanβ230Updated 3 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shellsβ273Updated 9 years ago
- NXcrypt - 'python backdoor' frameworkβ365Updated 7 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.β436Updated 5 years ago
- A Phishing Dropper designed to Pentest.β270Updated 7 years ago
- Plugins for Metasploit Frameworkβ439Updated 6 years ago
- PhEmail is a python open source phishing email tool that automates the process of sending phishing emails as part of a social engineeringβ¦β335Updated 5 years ago
- network reconnaissance toolkitβ421Updated 6 years ago
- My collection of metasploit auxiliary post-modulesβ190Updated 5 years ago
- Collection of social engineering payloadsβ295Updated 7 years ago
- Terminator metasploit payload generatorβ177Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.β201Updated last year
- Password lists for use in penetration testing situations, broken up by TLD.β319Updated 9 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?β405Updated 3 years ago
- Cloak can backdoor any python script with some tricks.β487Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ371Updated last year
- metasploitHelperβ246Updated 4 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.β339Updated 7 years ago
- Inject malicious code into *.debsβ270Updated 2 years ago
- Automates some pentest jobs via nmap xml fileβ324Updated 6 years ago