A data breach parser written in python
☆22Aug 21, 2019Updated 6 years ago
Alternatives and similar repositories for DBPP
Users that are interested in DBPP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- Torrent files for data breaches used in research☆177Dec 20, 2021Updated 4 years ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)☆18Oct 3, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Simple class for driving a st7735s LCD display in python 3☆11Nov 1, 2018Updated 7 years ago
- API for Asset Service☆15Aug 15, 2024Updated last year
- Slack Parser is a script to parse slack database and extract user-data, chat history, workspace information☆16Feb 21, 2021Updated 5 years ago
- C2 Server for pentesting, exploitation, and payload creation☆12Jul 17, 2024Updated last year
- Password Breach API Server☆88Jul 2, 2025Updated 8 months ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆194Oct 29, 2019Updated 6 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 6 years ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆137Nov 27, 2019Updated 6 years ago
- ☆18May 23, 2024Updated last year
- Pywallet 2.2 which was a fork created by jackjack of Joric's pywallet with the recover function☆16Jan 2, 2018Updated 8 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Wistalk : Analyze Wikipedia User's Activity☆25Jun 23, 2025Updated 9 months ago
- A place for personal ad hoc scripts☆10Jun 9, 2021Updated 4 years ago
- Show your Raspberry Pi stats on an i2c OLED display. e.g. IP address, CPU load, memory usage, SD usage and temperature☆12Feb 3, 2019Updated 7 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Use OpenDNS's investigate API to find newly observed domains which match a brand or string☆12Oct 27, 2016Updated 9 years ago
- Free Presentation Digital Signage for Everyone. Start using this tool right now. Ego View Digital Signage is an easy tool to create Digit…☆12Nov 12, 2024Updated last year
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Runs nmap on the LAN and then generates a basic ASCII network diagram, a 'hand drawn' network diagram and an bootstrap themed web report …☆23Feb 12, 2026Updated last month
- OLED 128x64 for MoodeAudio☆13Jun 4, 2018Updated 7 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago