Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into common tooling.
☆23Apr 29, 2022Updated 4 years ago
Alternatives and similar repositories for breach-rip
Users that are interested in breach-rip are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Torrent files for data breaches used in research☆178Dec 20, 2021Updated 4 years ago
- Links to various data breaches & data leaks☆52Apr 7, 2024Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆43Jun 30, 2025Updated 10 months ago
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆18Jul 15, 2024Updated last year
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Frack - Keep and Maintain your breach data☆387Sep 1, 2024Updated last year
- List of Custom Search Engines☆33Apr 7, 2020Updated 6 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- A little artoo.js bookmarklet to scrape and download the wanted or missing person lists from Interpol.☆12Dec 3, 2014Updated 11 years ago
- Virtualization Security Audit Tool - Security assess CIS compliance of a Virtualization environments☆15Nov 21, 2023Updated 2 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆135Nov 19, 2025Updated 5 months ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- More EFS coerced authentication method with PetitPotam.py☆28Mar 21, 2023Updated 3 years ago
- My Neovim settings☆34Jan 6, 2023Updated 3 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 7 months ago
- A library for Pythonistas to call Michael Bazzell's OSINT tools as functions☆21Aug 30, 2022Updated 3 years ago
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆32Apr 11, 2024Updated 2 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆96Apr 9, 2026Updated 3 weeks ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Aug 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆18Oct 28, 2025Updated 6 months ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆40Jan 29, 2025Updated last year
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- Download Free Databreaches☆335Sep 17, 2024Updated last year
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Sync entire obsidian library to notion database with images included. Minimal user intervention after initial setup, can be run multiple …☆24Jul 21, 2025Updated 9 months ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆16Jun 14, 2024Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago