Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)
☆29Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for danish-wordlists
Users that are interested in danish-wordlists are comparing it to the libraries listed below
Sorting:
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- A new web frontend for Hashtopolis☆42Updated this week
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 3 months ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- Centralized docs of ProjectDiscovery☆22Updated this week
- Custom password cracking rules for Hashcat and John the Ripper☆94Aug 19, 2024Updated last year
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- ☆19Nov 23, 2022Updated 3 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆140Jan 16, 2026Updated last month
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Feb 2, 2024Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Detect & filter duplicate hashcat rules☆47Jan 14, 2025Updated last year
- Collection of osint related links original posted by Tr1gger on raidforums.com which Tr1gger had copied from the @i_intelligence handbook☆22Jul 9, 2018Updated 7 years ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆20Apr 17, 2020Updated 5 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆94Feb 28, 2026Updated last week
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- Various wordlists FR & EN - Cracking French passwords☆317Updated this week
- All things specific to LLM Red Teaming Generative AI☆29Oct 22, 2024Updated last year
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Collection of our CTF write-ups☆28Aug 7, 2020Updated 5 years ago
- DEFCON 31 slide deck and video link☆67Jun 2, 2025Updated 9 months ago
- ☆37Sep 29, 2020Updated 5 years ago
- Mass target enumeration☆32Apr 3, 2021Updated 4 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 4 months ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- Based on reading from The Hackers Playbook 3☆30Mar 15, 2020Updated 5 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆37Feb 27, 2023Updated 3 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- A Tor Pluggable Transport that shields Tor users from passive and active correlation attacks by employing WebRTC-based covert channels an…☆11Dec 9, 2025Updated 3 months ago