spipm / Dutch-Password-ListLinks
Dutch (custom) password lists and custom rules for cracking
☆41Updated last year
Alternatives and similar repositories for Dutch-Password-List
Users that are interested in Dutch-Password-List are comparing it to the libraries listed below
Sorting:
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
 - Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
 - SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
 - Legba recipes.☆51Updated last year
 - Bluekit is an extensible engine, CLI tool used in BlueToolkit☆13Updated last month
 - "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
 - Session scripts.☆49Updated 3 years ago
 - Script to perform some hashcracking logic automagically☆76Updated 2 months ago
 - ☆80Updated 3 years ago
 - Command line interface to interact with hashes.com escrow service.☆38Updated 3 months ago
 - Customizable TCP fuzzing tool to test for remote buffer overflows.☆51Updated 5 years ago
 - OSDP attack tool (and the Elvish word for friend)☆103Updated 2 years ago
 - OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆119Updated last week
 - Monitor 802.11 probe requests from a capture file or network sniffing!☆32Updated 8 months ago
 - Modular framework to exploit UPS devices☆66Updated 2 years ago
 - Tools for maintaining access to systems and proof-of-concept demonstrations.☆174Updated 6 months ago
 - IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 9 months ago
 - Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
 - This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated 2 years ago
 - A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
 - Directory with Bluetooth exploits that is used in BlueToolkit☆17Updated last month
 - Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
 - 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆20Updated 3 months ago
 - CrackerJack / Hashcat Web Interface / Context Information Security☆61Updated 6 months ago
 - PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
 - Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆46Updated last year
 - hiding in plain sight: part 2☆45Updated last year
 - A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆20Updated 2 weeks ago
 - VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆72Updated last year
 - CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago