zxcv32 / indian-wordlist
Commonly used passwords in Indian demography
☆149Updated last year
Related projects: ⓘ
- ☆62Updated this week
- Cyber Security Foundations☆35Updated 3 years ago
- ☆67Updated last year
- Kali Mirrorscript-v2 automatically select the best kali mirror server and apply the configuration☆84Updated 6 months ago
- D-TECT - Pentesting the Modern Web☆121Updated 6 years ago
- 🛅 Passwords using personal information☆79Updated 4 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆116Updated 8 months ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆134Updated 4 years ago
- Tools for BugHunting☆192Updated 3 years ago
- Ultimate Recon Software for Information Gathering☆92Updated 4 years ago
- A python script designed to check if the website if vulnerable of clickjacking and create a poc☆134Updated 4 years ago
- ☆56Updated this week
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆265Updated last year
- PhishX - The Complete Spear Phishing Tool☆89Updated 6 years ago
- Collection of Python Scripts☆170Updated 2 years ago
- A python module for sending free sms as well as finding details of mobile number via website Way2sms.☆96Updated 6 years ago
- ☆86Updated this week
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆46Updated 3 years ago
- Detect evil urls that uses IDN Homograph Attack.☆185Updated 6 years ago
- Hide Your Secret Message in any Wave Audio File.☆145Updated 3 years ago
- Nice list of google dorks for SQL injection☆115Updated 6 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆158Updated 4 months ago
- Simple script masks the phishing link under the normal URL☆75Updated 3 years ago
- A tool that finds and scan sites for sql injection vulnerability☆145Updated 4 years ago
- ☆47Updated last year
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆171Updated 5 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 4 years ago
- Automate dorking while doing bug bounty or other stuffs.☆207Updated 2 years ago
- ☆120Updated 3 years ago
- Perform Google Dork search with Dorkify☆195Updated last year