santosomar / Probable-WordlistsLinks
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
☆19Updated 2 years ago
Alternatives and similar repositories for Probable-Wordlists
Users that are interested in Probable-Wordlists are comparing it to the libraries listed below
Sorting:
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆31Updated 2 years ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 10 months ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆51Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Distrubición Linux para Osint☆56Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 4 years ago
- an awesome list of active defense resources☆123Updated 5 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆64Updated 4 years ago
- Digital Forensics with Kali Linux, published by Packt☆92Updated 2 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Simple python script for converting Nmap XML to csv (and xlsx)☆38Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- An OSINT Metadata analyzing tool that filters through tags and creates reports☆117Updated 6 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 11 months ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- Collection of Wireshark resources & PCAP files used in the Blue Team training course☆63Updated 3 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆70Updated 8 months ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆75Updated last month
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆83Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆61Updated 8 years ago