toxydose / pnwgenLinks
A very flexible phone number wordlist generator
☆72Updated last year
Alternatives and similar repositories for pnwgen
Users that are interested in pnwgen are comparing it to the libraries listed below
Sorting:
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆59Updated 8 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆126Updated 6 years ago
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- Automated rogue access point setup tool.☆200Updated 4 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆90Updated 6 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago
- SQLi Google Dork Scanner☆59Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆83Updated 4 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆175Updated 3 weeks ago
- Dorks Hacking Database for educational proposal☆85Updated 5 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 11 months ago
- Record X11 keypress events to a log file☆27Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- website admin panel finder☆34Updated 5 years ago
- Generate customized wordlists for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)☆31Updated 2 years ago
- Complete Automated pentest framework for Information Gathering☆43Updated 6 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Updated 6 years ago
- bluesnarfing proof-of-concept tool.☆56Updated 10 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Updated 6 years ago
- Fast exploitation based on metasploit.☆74Updated 6 years ago
- wifi attacks suite☆59Updated 5 years ago
- Ultimate Recon Software for Information Gathering☆98Updated 5 years ago
- Mac and hostname random changer☆43Updated 8 years ago
- Dead simple brute force tool for website login forms☆95Updated last year
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year