spipm / Dutch-Password-List
Dutch (custom) password lists and custom rules for cracking
☆36Updated last year
Alternatives and similar repositories for Dutch-Password-List:
Users that are interested in Dutch-Password-List are comparing it to the libraries listed below
- Monitor 802.11 probe requests from a capture file or network sniffing!☆29Updated last week
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated 10 months ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆49Updated 4 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆20Updated 3 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆47Updated last year
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 4 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated 2 weeks ago
- Open Source and publicly modifiable knowledgebase about CyberSecurity Topics, Concepts, and Terminology. This replaces our prior repo whi…☆18Updated last month
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 6 months ago
- Legba recipes.☆44Updated 5 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 10 months ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- Exploit Development CheatSheet.☆15Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated 3 weeks ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆34Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆26Updated 6 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆29Updated 4 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆68Updated 3 months ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆10Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- Script to perform some hashcracking logic automagically☆67Updated 9 months ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- ☆42Updated 2 years ago
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆20Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago