A data breach parser written in python
☆22Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for DBPP
Users that are interested in DBPP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 3 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 3 years ago
- Simple class for driving a st7735s LCD display in python 3☆11Nov 1, 2018Updated 7 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- Slack Parser is a script to parse slack database and extract user-data, chat history, workspace information☆15Feb 21, 2021Updated 5 years ago
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- C2 Server for pentesting, exploitation, and payload creation☆13Jul 17, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- An Awesome List for getting started with web archiving☆19Dec 21, 2018Updated 7 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 6 years ago
- A Python project of the Raspberry Pi to control character LCD or OLED(SSD1311 controller) module via I2C protocol with button events. It …☆10Oct 16, 2018Updated 7 years ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 10 months ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆140Nov 27, 2019Updated 6 years ago
- Spotify Connect/Radio player with OLED display☆13Jul 14, 2018Updated 7 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- A collection of tools to open up wifi networks. Please note that, depending on your local laws, use of these tools or some of their featu…☆16Oct 31, 2012Updated 13 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- Wistalk : Analyze Wikipedia User's Activity☆25Jun 23, 2025Updated 9 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 3 years ago
- buffer overflow exploits for simple c programs (64 bit)☆17Feb 10, 2020Updated 6 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- Show your Raspberry Pi stats on an i2c OLED display. e.g. IP address, CPU load, memory usage, SD usage and temperature☆12Feb 3, 2019Updated 7 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- sync google contacts with information from the dominos data breach <3☆11May 24, 2021Updated 4 years ago