piotrcki / wordlist
1.6 billion passwords
☆47Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for wordlist
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆54Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- capNcook - a dark web exploration tool☆55Updated 7 months ago
- Autofill Phishing☆49Updated 4 months ago
- control windows computeur from telegram☆64Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆71Updated last year
- PrivacyNet: Privacy Network☆48Updated 2 months ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆45Updated last year
- PoC for SQL Injection in CVE-2024-27956☆83Updated 6 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆51Updated 2 months ago
- A new generation web interface for Hashcat☆33Updated 5 months ago
- ☆53Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆67Updated 3 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆96Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆264Updated 5 months ago
- NetProbe: Network Probe☆149Updated last month
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆52Updated 5 months ago
- Gmail/GSuite account enumeration tool☆48Updated 8 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆64Updated 8 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆184Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆119Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆107Updated 3 months ago
- Nmap & SQL injection automation tool☆29Updated last month
- Social Engineering Browser Update Attack.☆54Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- Discord bot for the Shodan API - OSINT tool☆66Updated 8 months ago
- Sifter - All purpose penetration testing op-center☆75Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- Google account phishing tool written in python using django☆88Updated last month
- Crack passwords with Hashcat using a Discord Bot.☆22Updated last year