k4m4 / dymerge
π A dynamic dictionary merger for successful dictionary based attacks.
β224Updated 3 years ago
Alternatives and similar repositories for dymerge:
Users that are interested in dymerge are comparing it to the libraries listed below
- information gathering via dorksβ384Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- Advanced Hash Manipulationβ178Updated 5 years ago
- metasploitHelperβ248Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β333Updated 9 months ago
- War Child denial of service testing suiteβ122Updated 7 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.β624Updated 3 months ago
- Linux bash script automation for metasploitβ264Updated 5 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.β345Updated 7 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shellsβ279Updated 9 years ago
- Git all your favorite tools in one clickβ266Updated 3 years ago
- SpeedPhishing Frameworkβ445Updated 5 years ago
- Multiplatform payload dropperβ272Updated 3 years ago
- Automates some pentest jobs via nmap xml fileβ324Updated 6 years ago
- A Phishing Dropper designed to Pentest.β273Updated 7 years ago
- NXcrypt - 'python backdoor' frameworkβ365Updated 7 years ago
- My collection of metasploit auxiliary post-modulesβ191Updated 5 years ago
- Password lists for use in penetration testing situations, broken up by TLD.β320Updated 9 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosβ290Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β602Updated 3 years ago
- Plugins for Metasploit Frameworkβ449Updated 6 years ago
- A unified console to perform the "kill chain" stages of attacks.β204Updated last year
- Execute a brute force attack with Steghide to file with hide information and password establishedβ120Updated 4 years ago
- Metasploit AV Evasion Toolβ260Updated 9 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.β612Updated 6 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.β344Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ286Updated 5 years ago
- WPSploit - Exploiting Wordpress With Metasploitβ227Updated 7 years ago
- Office for Mac Macro Payload Generatorβ241Updated 7 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here Iβll outline the different API keys it cβ¦β160Updated 7 years ago