spipm / Dutch-Password-ListLinks
Dutch (custom) password lists and custom rules for cracking
☆40Updated last year
Alternatives and similar repositories for Dutch-Password-List
Users that are interested in Dutch-Password-List are comparing it to the libraries listed below
Sorting:
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆117Updated 2 weeks ago
- Legba recipes.☆50Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆170Updated 4 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 7 months ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Script to perform some hashcracking logic automagically☆74Updated last week
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆14Updated last year
- A utility to fetch and display dns names from the SSL/TLS cert data☆14Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- hiding in plain sight: part 2☆45Updated last year
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated 2 years ago
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆18Updated last month
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆30Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- ☆76Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- APK Infrastructure Investigator☆64Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆61Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆51Updated 5 years ago
- ☆43Updated 4 months ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- One BadUSB to rule them all using ATmega32U4☆23Updated 4 years ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated 2 years ago