toxydose / pnwgen
A very flexible phone number wordlist generator
☆63Updated 8 months ago
Alternatives and similar repositories for pnwgen:
Users that are interested in pnwgen are comparing it to the libraries listed below
- Based on reading from The Hackers Playbook 3☆30Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆77Updated 5 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆50Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 5 years ago
- Information gathering tool - OSINT☆33Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆18Updated 4 years ago
- Simple Backdoor Manager with Python (based on weevely)☆93Updated last year
- Binaries Payloads Web Payloads Scripting Payloads Shellcode☆38Updated 6 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- M0B tool v2 : exploit - brute force - website informations gathering - dork scanner with 9 search engines - full ip ports scanner - shell…☆14Updated 6 years ago
- This Script Can Generate,Grab And Check Url's!☆11Updated 5 years ago
- ☆30Updated 8 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆133Updated 4 years ago
- 🛅 Passwords using personal information☆80Updated 4 years ago
- A Auto Tor IP Changer Tool.This program can automatic change our tor idenity/ip.100% working.☆30Updated 4 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 5 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆64Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)☆32Updated last year
- ITWSV- Integrated Tool for Web Security Vulnerability☆59Updated 5 years ago
- CUPP - Common User Passwords Profiler !☆12Updated 8 months ago
- Record X11 keypress events to a log file☆24Updated 6 years ago
- This is Google Phishing page is created for knowledge purpose , And You should Add the Sql data links,☆36Updated 2 years ago
- Ultimate Recon Software for Information Gathering☆96Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year