k4m4 / dymergeLinks
π A dynamic dictionary merger for successful dictionary based attacks.
β227Updated 4 years ago
Alternatives and similar repositories for dymerge
Users that are interested in dymerge are comparing it to the libraries listed below
Sorting:
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 8 years ago
- metasploitHelperβ251Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β337Updated last year
- NXcrypt - 'python backdoor' frameworkβ369Updated 8 years ago
- A Phishing Dropper designed to Pentest.β274Updated 8 years ago
- Advanced Hash Manipulationβ176Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)β468Updated 5 years ago
- Automates some pentest jobs via nmap xml fileβ323Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]β223Updated 4 years ago
- search for hosts info with shodanβ233Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)β190Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.β350Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ292Updated 6 years ago
- SpeedPhishing Frameworkβ447Updated 6 years ago
- Scripts that are useful for me on pen testsβ535Updated 3 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here Iβll outline the different API keys it cβ¦β165Updated 7 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shellsβ297Updated 10 years ago
- The Hacker's ToolBoxβ189Updated 8 years ago
- Cloak can backdoor any python script with some tricks.β501Updated 6 years ago
- Linux bash script automation for metasploitβ267Updated 6 years ago
- network reconnaissance toolkitβ431Updated 6 years ago
- The Credential Mapperβ448Updated 7 years ago
- Git all your favorite tools in one clickβ269Updated 3 years ago
- A unified console to perform the "kill chain" stages of attacks.β206Updated 2 years ago
- WPSploit - Exploiting Wordpress With Metasploitβ228Updated 7 years ago
- Plugins for Metasploit Frameworkβ468Updated 6 years ago
- Framework for Man-In-The-Middle attacksβ189Updated 8 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosβ292Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ546Updated last year
- Inject malicious code into *.debsβ276Updated 3 years ago