4ndronicus / credential-research
Research on the various credentials databases that have been dumped.
☆9Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for credential-research
- Public exploits☆14Updated 6 years ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 4 years ago
- Just another tool to screenshot web servers☆16Updated last year
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated last year
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆13Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 5 years ago
- A forensic system baselining, searching, and evidence collection tool☆13Updated 5 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Geolocate your files!☆16Updated 2 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Network white noise collector☆18Updated 8 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 6 years ago