Password Lists for penetration testing, sorted by language.
☆13Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for Language-Password-Lists
Users that are interested in Language-Password-Lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- Kali Linux Web Penetration Testing Cookbook - Second Edition, published by Packt☆22Jan 15, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Jan 25, 2026Updated 2 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- LFI/RFI scanner by Iman Karim (fimap.dev@gmail.com)☆10Jul 3, 2015Updated 10 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Jan 11, 2023Updated 3 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- A Python implementation of Crackstion's Hash Lookup☆26Jul 4, 2020Updated 5 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- guest→system(UAC手动提权)☆74Mar 18, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- penetration testing ebooks for free☆12Nov 4, 2019Updated 6 years ago
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 3 months ago
- 用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞☆52May 21, 2020Updated 5 years ago