FreeZeroDays / breach-ripLinks
Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into common tooling.
☆23Updated 3 years ago
Alternatives and similar repositories for breach-rip
Users that are interested in breach-rip are comparing it to the libraries listed below
Sorting:
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆60Updated 3 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- ☆67Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- Helping you delete your old accounts☆86Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Updated 2 years ago
- A selection of useful Custom Serch Engines for OSINT.☆75Updated last month
- OSINT automation for hackers.☆22Updated 2 years ago
- ☆26Updated 7 months ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆46Updated 8 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Python Gmail User Enumeration Tool☆15Updated 6 months ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- 🕵️ Email osint tool☆64Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆113Updated last year
- SOCMINT tool to find social media accounts.☆31Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆74Updated 3 years ago
- ☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissan…☆110Updated 2 weeks ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago