A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and cross-platform parity. Supports strong, base64, memorable, and quantum-resistant passwords with real-time entropy calculation.
☆24May 9, 2026Updated last week
Alternatives and similar repositories for password-generator
Users that are interested in password-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🛡️ Secure lock screen Windows 🖥️☆41May 8, 2026Updated last week
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆23Jan 6, 2026Updated 4 months ago
- Yet another web recon tool☆60Aug 9, 2023Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Pentesting post exploitation tool for slack☆33Apr 3, 2026Updated last month
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆177Feb 14, 2026Updated 3 months ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆25Jan 29, 2024Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- Dragonfire is an open source virtual assistant project for RaspberryPi OSMC/Kodi☆17May 18, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆13Oct 14, 2017Updated 8 years ago
- Remove digital certificates from files.☆12Mar 13, 2014Updated 12 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- ListDisk - command line application to list physical discs informations☆14Dec 8, 2025Updated 5 months ago
- Proviesec Fuzz Scanner - dir/path web scanner☆109Mar 29, 2026Updated last month
- scripts for Windows 10 default settings without using sysprep audit mode☆12Jul 29, 2024Updated last year