s0md3v / LockyLinks
Locky generates "really" strong yet easy to remember passwords.
☆70Updated 6 years ago
Alternatives and similar repositories for Locky
Users that are interested in Locky are comparing it to the libraries listed below
Sorting:
- A python module for dumping usable proxies.☆160Updated 5 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆122Updated 4 years ago
- Easy way to brute-force web directory.☆153Updated 6 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Anti-Automation System☆128Updated 4 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆71Updated 8 years ago
- HTML form parser for humans.☆79Updated 5 years ago
- Python script that gets Twitter users' tweets location☆109Updated 7 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- wifi attacks suite☆59Updated 4 years ago
- Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)☆66Updated 4 years ago
- Exploit pack for pentesters and ethical hackers.☆116Updated 8 years ago
- SQLi Google Dork Scanner☆59Updated 3 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆81Updated 9 years ago
- ☆109Updated 2 years ago
- A simple bash based metasploit automation tool!☆123Updated 2 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Entropy is a (prototype) WAF driven by maths.☆56Updated 6 years ago
- Pastebin-scraper tool leverages the API of https://psbdmp.ws/ to find emails/domains dumped in pastebin.☆126Updated last year
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Collection My Wordlist☆122Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆137Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Information gathering tool - OSINT☆37Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago