Analysis and Creation of Wordlists with Complex Passwords for Password Cracking
☆10Updated this week
Alternatives and similar repositories for ComplexPassAnalysisAndWordlists
Users that are interested in ComplexPassAnalysisAndWordlists are comparing it to the libraries listed below
Sorting:
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Jul 3, 2023Updated 2 years ago
- #Simple program to track someone by send malicious link☆14May 17, 2020Updated 5 years ago
- This script can pick up a password from user's databases to WiFi networks.☆18Jul 25, 2022Updated 3 years ago
- WH RAT V2 2022☆25Jan 19, 2024Updated 2 years ago
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated last year
- ☆11Dec 15, 2022Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆43Jun 30, 2024Updated last year
- Simple tool to view all passwords of WiFi networks saved in Windows☆12Sep 7, 2025Updated 5 months ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- Check to see if a password is safe using many different methods, including HavIBeenPwned and comparing it to a list of over 100000+ commo…☆10Apr 18, 2021Updated 4 years ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆12Apr 26, 2022Updated 3 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆36Feb 12, 2026Updated 2 weeks ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Password list generator in node js☆10May 8, 2024Updated last year
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- ☆14Apr 6, 2025Updated 10 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago