toxydose / pnwgenLinks
A very flexible phone number wordlist generator
☆71Updated last year
Alternatives and similar repositories for pnwgen
Users that are interested in pnwgen are comparing it to the libraries listed below
Sorting:
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Updated 5 years ago
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- Fast exploitation based on metasploit.☆75Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 9 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 8 years ago
- Complete Automated pentest framework for Information Gathering☆43Updated 6 years ago
- Information gathering tool - OSINT☆37Updated 6 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 4 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Updated 5 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆34Updated 4 years ago
- wifi attacks suite☆60Updated 5 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆53Updated 8 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Keylogger using pynput + mail sender☆55Updated 5 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 6 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆80Updated 5 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆159Updated 2 weeks ago
- Record X11 keypress events to a log file☆27Updated 7 years ago
- A simple script to generate a hidden url for social engineering.☆121Updated 5 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆68Updated last week
- Ultimate Recon Software for Information Gathering☆97Updated 5 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆65Updated 6 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆35Updated 4 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆55Updated 4 years ago