CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆82Apr 26, 2026Updated last week
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of cred…☆201Updated this week
- Challenges and writeups from SamsungCTF☆99Aug 25, 2023Updated 2 years ago
- UT based automated fuzz driver generation☆169Apr 16, 2025Updated last year
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Kismet website generation & documentation data☆12Mar 24, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Tools around MobSF security mobile testing solution☆14Sep 24, 2019Updated 6 years ago
- FedUL: Federated Learning from Only Unlabeled Data with Class-Conditional-Sharing Clients☆33Jul 11, 2023Updated 2 years ago
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 6 years ago
- Golang的工具库(Tools of Golang)☆14Updated this week
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- Imports IP address and CIDR information into a SQLite Database format☆15Apr 11, 2026Updated 3 weeks ago
- Official code for Guiding Language Model Math Reasoning with Planning Tokens☆19Feb 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Semgrep Pro Rules to ensure code using LLMs is following best practices☆70Mar 25, 2026Updated last month
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 11 years ago
- ☆10Aug 19, 2023Updated 2 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- ☆27Apr 18, 2026Updated 2 weeks ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆26Mar 26, 2021Updated 5 years ago
- ☆13Mar 22, 2021Updated 5 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆17Jun 3, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Technical webinars on reverse engineering, malware analysis, and software protection.☆57Updated this week
- ☆16Dec 21, 2023Updated 2 years ago
- A tool to scrape the ipfs network for information on the number of peers in the network.☆21Mar 22, 2024Updated 2 years ago
- Golang implementation of a BIP32, BIP44, BIP49 and BIP84 compatible hierarchical determinstic wallet☆14Jul 25, 2018Updated 7 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- Code for Horizontal Federated Learning blog around Credit Scoring☆10Sep 14, 2020Updated 5 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Implementation guide for those using the _DSD method as defined in the ACPI specification☆26Dec 15, 2023Updated 2 years ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- can calculate the Hessian matrix and/or its spectrum for simple neural nets☆11May 7, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Concurrent, sequential, functional transformations along Golang channels.☆24Jan 29, 2014Updated 12 years ago
- Valhalla 🤝 🦀☆23Apr 7, 2026Updated 3 weeks ago
- Common IMAP provider settings☆15Apr 20, 2017Updated 9 years ago
- ☆10Feb 19, 2024Updated 2 years ago