4ndronicus / credential-researchLinks
Research on the various credentials databases that have been dumped.
☆10Updated 7 years ago
Alternatives and similar repositories for credential-research
Users that are interested in credential-research are comparing it to the libraries listed below
Sorting:
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 4 years ago
- dbling: The Chrome OS Forensic Toolset☆13Updated 4 years ago
- Node.js PoC exploit code for CVE-2018-4407☆11Updated 6 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Network white noise collector☆19Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- Public exploits☆15Updated 7 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- a Modular web penetration testing interface☆15Updated last year
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- ssshh its a secret ;)☆22Updated 3 years ago
- dev level ;-)☆10Updated 6 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- A web app scanner☆26Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆32Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- A collection of awesome readme templates to display on your profile☆17Updated 4 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆14Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago