nil0x42 / duplicutLinks
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
☆944Updated 2 months ago
Alternatives and similar repositories for duplicut
Users that are interested in duplicut are comparing it to the libraries listed below
Sorting:
- Automatic Enumeration Tool based in Open Source tools☆929Updated last year
- A tool that can help detect and takeover subdomains with dead DNS records☆766Updated 4 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆949Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆514Updated last year
- Mass scan IPs for vulnerable services☆1,035Updated 3 years ago
- Local file inclusion exploitation tool☆875Updated last year
- Zero Infrastructure Password Cracking☆408Updated 10 months ago
- large hashcat rulesets generated from real-world compromised passwords☆396Updated 4 years ago
- Python 3.5+ DNS asynchronous brute force utility☆659Updated last year
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,134Updated 2 years ago
- Rule for hashcat or john. Aiming to crack how people generate their password☆441Updated 10 months ago
- Pull out bits of URLs provided on stdin☆1,203Updated last year
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,241Updated last year
- Subdomain finder☆368Updated last year
- Modern alternative to dirbuster/dirb☆385Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆754Updated 9 months ago
- Some files for bruteforcing certain things.☆1,322Updated 2 weeks ago
- Subdomain and target enumeration tool built for offensive security testing☆885Updated last year
- Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.☆1,054Updated last year
- This project crawls bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) hourly and dumps them into the bounty-targets-data…☆691Updated this week
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆809Updated 2 months ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆627Updated 3 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,226Updated last year
- A list of shodan filters☆572Updated 6 years ago
- Some of the best web shells that you might need!☆339Updated 2 years ago
- A default credential scanner.☆1,490Updated last week
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆379Updated 7 months ago
- Making Favicon.ico based Recon Great again !☆1,216Updated last year
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆729Updated 3 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆553Updated 2 years ago