D4Vinci / pwndb
Search for leaked creadentials on pwndb using the command line and tor.
☆23Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for pwndb
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 2 years ago
- Random scripts I write to automate non-hacking stuff☆21Updated 5 years ago
- Basic python script for detect airdroid users in lan☆47Updated 4 years ago
- Information gathering tool - OSINT☆33Updated 5 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆11Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆49Updated 7 years ago
- wifi attacks suite☆59Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆71Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 6 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- A simple python script to grab twitter account info just by username or profile link☆52Updated 7 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆18Updated 3 months ago
- SQLi Google Dork Scanner☆60Updated 2 years ago
- Program to anonymize spam texts, to targets, or target lists☆14Updated 6 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 6 years ago
- Automatic Ducky Payload Generator☆16Updated 2 years ago
- Keylogger for ethical hackers☆14Updated 3 years ago