nil0x42 / duplicutLinks
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
β951Updated 4 months ago
Alternatives and similar repositories for duplicut
Users that are interested in duplicut are comparing it to the libraries listed below
Sorting:
- Automatic Enumeration Tool based in Open Source toolsβ949Updated last year
- π§ Abuse of Google Colab for cracking hashes.β956Updated 2 years ago
- A tool that can help detect and takeover subdomains with dead DNS recordsβ766Updated 4 years ago
- Subdomain and target enumeration tool built for offensive security testingβ895Updated last year
- Local file inclusion exploitation toolβ887Updated 2 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.β1,268Updated last week
- Mass scan IPs for vulnerable servicesβ1,038Updated 3 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.β519Updated last year
- Some files for bruteforcing certain things.β1,343Updated last month
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.β1,261Updated 4 months ago
- Python 3.5+ DNS asynchronous brute force utilityβ662Updated last year
- Modern alternative to dirbuster/dirbβ393Updated last year
- HostHunter a recon tool for discovering hostnames using OSINT techniques.β1,135Updated 2 years ago
- Making Favicon.ico based Recon Great again !β1,233Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binβ¦β635Updated last month
- This project crawls bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) hourly and dumps them into the bounty-targets-dataβ¦β692Updated 2 months ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.β728Updated 3 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.β1,213Updated last year
- large hashcat rulesets generated from real-world compromised passwordsβ398Updated 4 years ago
- OSINT tools and more but without API keyβ1,378Updated 2 months ago
- Pull out bits of URLs provided on stdinβ1,218Updated 2 years ago
- Infosec Wordlists and more.β882Updated 3 months ago
- Rule for hashcat or john. Aiming to crack how people generate their passwordβ449Updated last year
- Subdomain finderβ369Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to β¦β752Updated 11 months ago
- β‘ Perform subdomain enumeration using the certificate transparency logs from Censys.β818Updated 4 months ago
- Running Hashcat on Google Colab with session backup and restore.β742Updated 3 years ago
- Zero Infrastructure Password Crackingβ409Updated last year
- Convolutional neural network for analyzing pentest screenshotsβ1,242Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.β769Updated 5 years ago