zxcv32 / indian-wordlist
Commonly used passwords in Indian demography
☆180Updated 2 years ago
Alternatives and similar repositories for indian-wordlist:
Users that are interested in indian-wordlist are comparing it to the libraries listed below
- Tools for BugHunting☆239Updated 4 years ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆145Updated 4 years ago
- Spoof who an SMS is from using an SMS API☆385Updated 2 years ago
- D-TECT - Pentesting the Modern Web☆129Updated 7 years ago
- ☆119Updated 4 years ago
- Hash cracker with auto detect hash☆242Updated 4 years ago
- Python wordlist generator☆168Updated 3 years ago
- Collection of Python Scripts☆176Updated 5 months ago
- PhishX - The Complete Spear Phishing Tool☆109Updated 6 years ago
- This an Instagram Bruteforcing tool☆105Updated last year
- Detect evil urls that uses IDN Homograph Attack.☆200Updated 7 years ago
- Ultimate Recon Software for Information Gathering☆97Updated 4 years ago
- A tool that finds and scan sites for sql injection vulnerability☆153Updated 5 years ago
- Undetectable helps you to generate fully undetectable payload of metasploit which can bypass android antivirus.☆109Updated last year
- ☆656Updated 7 months ago
- Now you can download the most powerful tools using this simple script☆578Updated 2 years ago
- ☆70Updated 7 months ago
- An advanced multithreaded admin panel finder written in python.☆792Updated 11 months ago
- Perform Google Dork search with Dorkify☆201Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- Chrome Keylogger Extension | Post Exploitation Tool☆428Updated 3 years ago
- 🛅 Passwords using personal information☆82Updated 4 years ago
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆304Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆741Updated 5 years ago
- Perform various social engineering attacks using PHP, Apache, Ngrok 🦥☆205Updated 3 years ago
- DH HackBar. Advanced Web Penetration Testing Tool.☆385Updated 11 months ago
- Phishing Tool For Advanced Instagram Copyright Infringement Attack☆82Updated last year
- (Doesn't work anymore)☆178Updated 4 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆137Updated last year
- ☆349Updated 4 years ago