waelmas / w-generator-offlineView external linksLinks
W Generator - A powerful frontend tool for penetration testers to generate customized wordlists based on public user information
☆43Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for w-generator-offline
Users that are interested in w-generator-offline are comparing it to the libraries listed below
Sorting:
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ☆12Feb 20, 2025Updated 11 months ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- hashgen - the blazingly fast hash generator☆40Updated this week
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆19Sep 28, 2024Updated last year
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆48May 24, 2025Updated 8 months ago
- Flash Force is a parallelism-based multiprocess hash cracking tool written in Python. Achieve GOD SPEED while cracking the hash with full…☆24Jun 19, 2025Updated 7 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 4 months ago
- AhMyth is an popular open source android rat. But the official AhMyth contains many bugs. For an example, you can't fetch victim's files …☆23Jan 30, 2021Updated 5 years ago
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Sends a verify code to your email from microsoft☆12Aug 17, 2025Updated 5 months ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆26Jul 28, 2018Updated 7 years ago
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 3 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Jan 21, 2024Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Jul 5, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆11Feb 21, 2021Updated 4 years ago
- ☆36Nov 26, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆35Jul 28, 2020Updated 5 years ago
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- KaliAI is an advanced AI assistant designed to help security professionals and ethical hackers leverage Kali Linux tools effectively and …☆18Mar 25, 2025Updated 10 months ago
- Connect to Cisco AnyConnect VPN and open a Microsoft Remote Desktop (RDP) window☆11Aug 9, 2023Updated 2 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- ☆18Nov 20, 2020Updated 5 years ago
- Do some DLL SideLoading magic☆89Sep 20, 2023Updated 2 years ago
- (CLI wrapper) Takes a list of URLs and retrieve screenshots of older versions stored on the Wayback Machine.☆41Jun 23, 2022Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44May 18, 2024Updated last year
- Timejam for Rolljam with Hackrf Portapack☆40Oct 19, 2020Updated 5 years ago