toxydose / pnwgenLinks
A very flexible phone number wordlist generator
β69Updated last year
Alternatives and similar repositories for pnwgen
Users that are interested in pnwgen are comparing it to the libraries listed below
Sorting:
- π Passwords using personal informationβ83Updated 5 years ago
- Ultimate Recon Software for Information Gatheringβ99Updated 5 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be usβ¦β56Updated 7 years ago
- Simple Backdoor Manager with Python (based on weevely)β95Updated 7 months ago
- Complete Automated pentest framework for Information Gatheringβ43Updated 5 years ago
- Fast exploitation based on metasploit.β74Updated 5 years ago
- Customized Password/Passphrase List inputting Target Infoβ92Updated 10 months ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.β84Updated 5 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses anβ¦β137Updated 5 years ago
- wifi attacks suiteβ60Updated 5 years ago
- A simple script to generate a hidden url for social engineering.β121Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Pythonβ56Updated 5 years ago
- SQLi Google Dork Scannerβ59Updated 3 years ago
- Gloom-Framework :: Linux Penetration Testing Frameworkβ51Updated 8 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.β35Updated 4 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995β110Updated 6 years ago
- Automated rogue access point setup tool.β198Updated 4 years ago
- Advance Google Dorker and Vulnerability Scannerβ49Updated 6 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.β36Updated 5 years ago
- A tool to harvest credentials from leaked data dumpβ76Updated 3 years ago
- !!!WORLD'S π #1π₯ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most toβ¦β47Updated 2 years ago
- Information gathering tool - OSINTβ38Updated 6 years ago
- Keylogger using pynput + mail senderβ54Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β186Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idkβ53Updated 4 years ago
- website admin panel finderβ33Updated 4 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.β31Updated 6 years ago
- A multithreaded rewrite of the classic theHarvester email address collection script.β53Updated last month
- Crackhash is a tool that try to crack different types of hashes using free online services.β26Updated 5 years ago
- Search for leaked creadentials on pwndb using the command line and tor.β25Updated 6 years ago