zxcv32 / indian-wordlistLinks
Commonly used passwords in Indian demography
☆190Updated 2 weeks ago
Alternatives and similar repositories for indian-wordlist
Users that are interested in indian-wordlist are comparing it to the libraries listed below
Sorting:
- Tools for BugHunting☆243Updated 4 years ago
- Kali Mirrorscript-v2 automatically select the best kali mirror server and apply the configuration☆85Updated last year
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆148Updated 4 years ago
- D-TECT - Pentesting the Modern Web☆132Updated 7 years ago
- ☆119Updated 4 years ago
- Perform Google Dork search with Dorkify☆204Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆121Updated last year
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆317Updated 2 years ago
- Automate dorking while doing bug bounty or other stuffs.☆221Updated 3 years ago
- A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.☆263Updated 2 years ago
- Spoof who an SMS is from using an SMS API☆392Updated 2 years ago
- Collection of Python Scripts☆180Updated 8 months ago
- BurpSuite Pro, Plugins and Payloads☆125Updated 5 years ago
- Quick SQL Scanner, Dorker, Webshell injector PHP☆239Updated last year
- 🛅 Passwords using personal information☆84Updated 5 years ago
- ☆33Updated 8 years ago
- A tool that finds and scan sites for sql injection vulnerability☆157Updated 5 years ago
- Nice list of google dorks for SQL injection☆129Updated 7 years ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆228Updated 3 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆513Updated last year
- The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile…☆338Updated 2 months ago
- Tool perform evil twin attack & defence☆31Updated 6 years ago
- WiFi Cracking Tool (Using Evil Twin Attack) With Some Modification. (Only For Legal Purposes)☆265Updated 7 years ago
- A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner☆713Updated last year
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆161Updated last year
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆142Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆428Updated 3 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆53Updated 4 years ago
- Ultimate Recon Software for Information Gathering☆98Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆807Updated last year