Passlord is a smart tool that creates lists of possible passwords using clever methods.
☆32Aug 26, 2025Updated 8 months ago
Alternatives and similar repositories for passlord
Users that are interested in passlord are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 7 years ago
- Pentesting Suite☆70Jul 1, 2025Updated 10 months ago
- A script to access someone's webcam by sharing a link.☆10May 3, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Track any ip address with IP-Tracer. IP-Tracer is developed for linux and android terminal like Termux and GNURoot Debian. you can retrie…☆32Apr 2, 2020Updated 6 years ago
- Penetration Testing MCP for Claude Code. AI-assisted security testing with automated recon, service enumeration, and reporting.☆53Apr 20, 2026Updated 2 weeks ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆18Feb 4, 2021Updated 5 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- ☆18Aug 13, 2021Updated 4 years ago
- A tool to get all WhatsApp media (images, audios, videos, documents) from victim's phone.☆12May 8, 2020Updated 6 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 8 months ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 3 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- SQL Detector Tool In Go Language☆22Jan 10, 2023Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- HashRipper is a powerful and fast multi-threaded ethical hacking tool written in Python for cracking hashes. It supports over 17+ popular…☆23Apr 12, 2026Updated 3 weeks ago
- ☆28Feb 14, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 3 months ago
- Tools for Pentesting that all hacker need....☆17Aug 26, 2022Updated 3 years ago
- Start your journey with Bug Bounty.☆15Oct 12, 2022Updated 3 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆18Oct 25, 2025Updated 6 months ago
- Quickly create a list of dorks based on variables entered.☆18Mar 7, 2026Updated 2 months ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 5 years ago
- 🕹️ Enter a command with OLED Joystick ▶️ Run + Display output on OLED Screen (Works with P4wnP1!)☆18Dec 23, 2021Updated 4 years ago
- Analysis Plugin and Tools for Vivisect☆21Dec 1, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- This tool serves to add the kali linux repository to the ubuntu repository instantly. So that ubuntu users can install some of the tools …☆19Apr 16, 2022Updated 4 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- Caddy v2 module to calculate the JA4H fingerprinter for each request☆25Jan 14, 2026Updated 3 months ago
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago