A victims'-profile-based wordlist generating tool for social engineers and security researchers!
☆63Nov 24, 2016Updated 9 years ago
Alternatives and similar repositories for pwdlogy
Users that are interested in pwdlogy are comparing it to the libraries listed below
Sorting:
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆26Nov 12, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- C++ library for detecting Visual C++ runtimes on Windows XP and later.☆18Jul 7, 2014Updated 11 years ago
- ☆13Apr 23, 2018Updated 7 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- A collection of bro_scripts and signatures☆27Jun 26, 2019Updated 6 years ago
- Wireless Probe Requests Sniffer☆189Aug 31, 2022Updated 3 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- 烛龙 -- 基于Docker的环境快速搭建系统☆12Dec 2, 2016Updated 9 years ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- ############################################################ # +------------------------------------------------------+ # # | …☆11Feb 3, 2019Updated 7 years ago
- A massive curated list of curated lists of various info sec/pen testing tools, resources, and tricks covering multiple verticals.☆16Nov 6, 2017Updated 8 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- Simple python malware for back connect in windows☆59Apr 24, 2018Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Duncan - Blind SQL injector skeleton☆60Jan 11, 2022Updated 4 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago