π A dynamic dictionary merger for successful dictionary based attacks.
β229Sep 18, 2021Updated 4 years ago
Alternatives and similar repositories for dymerge
Users that are interested in dymerge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π° An onion url inspector for inspecting deep web links.β704Aug 4, 2022Updated 3 years ago
- β22Aug 31, 2016Updated 9 years ago
- β138Jul 13, 2017Updated 8 years ago
- Retrieve an array of possible hash types corresponding to a given string.β17Jan 5, 2023Updated 3 years ago
- Extract Sense out of Gibberish stuffβ81May 11, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- My collection of metasploit auxiliary post-modulesβ192May 25, 2019Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β88May 8, 2018Updated 7 years ago
- Source Code Intelligenceβ30Aug 21, 2017Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!β97May 12, 2018Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.β123Jul 9, 2019Updated 6 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.β26Jan 6, 2023Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)β36Oct 17, 2013Updated 12 years ago
- A webshell framework for penetration testers.β301Aug 10, 2025Updated 8 months ago
- unix wildcard attacksβ138May 25, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- π€ Kick devices off your network by performing an ARP Spoof attack.β2,662Feb 27, 2023Updated 3 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORKβ223Apr 15, 2019Updated 7 years ago
- Next Generation Firewall Audit and Bypass Toolβ266Apr 24, 2017Updated 8 years ago
- SpeedPhishing Frameworkβ450Aug 8, 2019Updated 6 years ago
- The Credential Mapperβ452Dec 1, 2017Updated 8 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.β11Jan 5, 2023Updated 3 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ161Aug 5, 2016Updated 9 years ago
- Advanced Netstat Using Python For Windowsβ46Aug 21, 2017Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ291May 14, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Reverse Engineering Tool for py2exe applications.β210May 21, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networksβ200Apr 17, 2019Updated 7 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?β420Jun 23, 2021Updated 4 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOLβ390Sep 24, 2021Updated 4 years ago
- A web front-end for password cracking and analyticsβ621Dec 15, 2021Updated 4 years ago
- Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long runβ¦β54Apr 17, 2016Updated 10 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β207Dec 4, 2017Updated 8 years ago
- CVE-2018-13379 Script for Nmap NSE.β12Sep 9, 2020Updated 5 years ago
- Collect XSS vulnerable parameters from entire domain.β13Jul 29, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IPv6 address spoofing with the Neighbor Discovery Protocolβ53Jul 15, 2018Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β44Jul 24, 2019Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injectorβ1,021Sep 11, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ1,460Nov 3, 2018Updated 7 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.β352Jan 12, 2023Updated 3 years ago
- wide range mass audit toolkitβ1,038Oct 3, 2018Updated 7 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β322Nov 3, 2019Updated 6 years ago