HaveIBeenPwned / PwnedPasswordsDownloaderLinks
A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API
☆1,075Updated 8 months ago
Alternatives and similar repositories for PwnedPasswordsDownloader
Users that are interested in PwnedPasswordsDownloader are comparing it to the libraries listed below
Sorting:
- A project to rapidly extract all email addresses from any files in a given path☆192Updated 2 months ago
- Trace Labs OSINT VM☆481Updated this week
- A collection of fascinating and bizarre Censys Search Queries☆1,190Updated this week
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆412Updated 2 months ago
- A tool to perform DNS reconnaissance on target networks. Among the DNS information got from include subdomains, mx records, web applicati…☆358Updated last year
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆443Updated 6 months ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 6 months ago
- Concept script to demonstrate how to exfiltrate data inside of ping packets☆90Updated last year
- OT security monitoring #nsacyber☆613Updated last year
- Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text☆875Updated last year
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆970Updated last week
- A website and framework for testing NIDS detection☆305Updated 5 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,077Updated 6 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆478Updated last week
- ☆269Updated 2 years ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 6 months ago
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆345Updated last year
- The clarion call tells you if someone is logging into an AitM proxy that is proxying your M365 login page☆84Updated last year
- Repository for the LinkScope Client software.☆441Updated 9 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆68Updated last year
- 🔍 An OSINT tool for discovering linked social accounts and associated emails across multiple platforms using a single username.☆887Updated 9 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆943Updated 2 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆885Updated last week
- Intro Labs Remastered☆34Updated 9 months ago
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆248Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆1,069Updated this week
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆290Updated last month
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆412Updated 7 months ago
- ☆543Updated 3 months ago
- C2 infrastructure over Microsoft Teams.☆730Updated 11 months ago