Password Lists for penetration testing, sorted by language.
☆13Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for Language-Password-Lists
Users that are interested in Language-Password-Lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Open source SDR LTE software suite☆19Jan 11, 2018Updated 8 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kali Linux Web Penetration Testing Cookbook - Second Edition, published by Packt☆22Jan 15, 2021Updated 5 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Build, sign and release APKs with Github Actions for any android project without forking source repos☆21Nov 15, 2024Updated last year
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 3 months ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 7 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 4 months ago
- Cracking PDF password protection via hashcat.☆16Dec 24, 2025Updated 3 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- For Bypass lock Screen On android | Tested On Android : 2..5☆22Jan 31, 2021Updated 5 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- A small cli utility for interacting with Hack the Box☆35Dec 8, 2022Updated 3 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Open-source UWB Device☆21Jun 14, 2024Updated last year
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- A Python implementation of Crackstion's Hash Lookup☆26Jul 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- penetration testing ebooks for free☆12Nov 4, 2019Updated 6 years ago