Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) the script to extend the final wordlist.
☆38Nov 1, 2018Updated 7 years ago
Alternatives and similar repositories for intelligence-wordlist-generator
Users that are interested in intelligence-wordlist-generator are comparing it to the libraries listed below
Sorting:
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Example demonstrating how to use KeyStore☆16Mar 16, 2017Updated 8 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- My custom semgrep rules☆23Sep 13, 2020Updated 5 years ago
- Small snippets of code we often find useful☆56Jun 25, 2015Updated 10 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated this week
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- Oled and menu button(GPIO) gestion for P4wnP1 for PI Zero by Mame82☆26Dec 24, 2017Updated 8 years ago
- Common scripts, mainly for text processing and experimental control☆20Aug 24, 2012Updated 13 years ago
- Unofficial port of setools to Android☆27Aug 22, 2017Updated 8 years ago
- web-based-fuzzer☆32Jun 26, 2020Updated 5 years ago
- This repo helps me compete in my Fantasy Football League.☆12Dec 8, 2022Updated 3 years ago
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Steam link Bluetooth controller Companion. Support for keyboard and mouse.☆10Oct 18, 2018Updated 7 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆49Jul 26, 2014Updated 11 years ago
- Converts Rubber Ducky scripts to arduino code that can run on the DigiSpark ATtiny85 USB device.☆37Aug 29, 2022Updated 3 years ago
- Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project☆10Mar 14, 2024Updated last year
- ☆12Feb 26, 2026Updated last week
- ☆10Mar 11, 2020Updated 5 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- SMF2WPBridge is a simple one way bridge from Simple Machine Forum to Wordpress.☆12Apr 10, 2020Updated 5 years ago
- AdWords Scripts developed by @AlbertoEstevesC☆12Jun 15, 2020Updated 5 years ago
- Walkie Talkie with Arduino Nano and nRF24L01☆10Sep 16, 2022Updated 3 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- ☆12Feb 16, 2012Updated 14 years ago
- Examples for using the Pipl SEARCH API☆11Dec 19, 2023Updated 2 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 6 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Jun 20, 2018Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago