4ndronicus / credential-researchLinks
Research on the various credentials databases that have been dumped.
☆10Updated 7 years ago
Alternatives and similar repositories for credential-research
Users that are interested in credential-research are comparing it to the libraries listed below
Sorting:
- Test Suite for John the Ripper☆25Updated 3 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- LightText (LT) is a lightning wallet that allows you to send and receive bitcoin payments over the lightning network. LT is an SMS client…☆10Updated 6 years ago
- Create Dashboards via Timelion API or via Import in Kibana 7.x and Elasticsearch 7.x with Python☆10Updated 4 years ago
- Communications layer used for both the Oxen storage server and oxend☆19Updated last week
- ☆24Updated 3 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Mac osx forensics tools☆11Updated 4 years ago
- My various configuration files for zsh, vim, tmux, etc.☆25Updated 3 years ago
- Simple tool to monitor network changes over time and trigger alerts☆16Updated 5 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Python wrapper around the Mach VM APIs☆21Updated 13 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 5 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆14Updated 2 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Updated 2 months ago
- ☆80Updated 9 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 8 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Audit Proposals and Reports for RandomX☆12Updated 6 years ago
- Simple IRC Bot for flooding☆11Updated 13 years ago
- A DNS database debugger☆35Updated 2 years ago
- A Camouflage Proxy for the Tor Anonymity System☆82Updated 10 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- ☆12Updated 8 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 9 years ago
- A tool to run a command when the target of a symlink changes☆16Updated 9 years ago
- sniff inputs type☆10Updated 8 years ago
- Vanity public key generator for use with IPFS and IPNS☆40Updated 2 years ago