CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆75Feb 17, 2026Updated last month
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Kismet website generation & documentation data☆12Mar 13, 2026Updated last week
- ☆30Nov 29, 2021Updated 4 years ago
- mssh is a tool for batching execute ssh commands.☆30Jan 8, 2015Updated 11 years ago
- Tools around MobSF security mobile testing solution☆14Sep 24, 2019Updated 6 years ago
- ☆10Apr 13, 2025Updated 11 months ago
- This is the official repository for files needed to complete certain challenges for DawgCTF Spring 2025.☆10Apr 19, 2025Updated 11 months ago
- Install LAMP(Linux + Apache + MySQL/MariaDB/Percona Server + PHP ) for CentOS/Fedora/Debian/Ubuntu☆10Apr 4, 2020Updated 5 years ago
- Golang的工具库(Tools of Golang)☆14Updated this week
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- EMVLogger is an open-source tool for testing and analyzing EMV chip cards and transaction logs using a comprehensive EMV Kernel Library. …☆13Jun 15, 2024Updated last year
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated 3 weeks ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- Ghidra Analysis Enhancer 🐉 Python3 version.☆13Aug 25, 2023Updated 2 years ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 9 months ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Golang implementation of a BIP32, BIP44, BIP49 and BIP84 compatible hierarchical determinstic wallet☆14Jul 25, 2018Updated 7 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- ☆14Jul 11, 2017Updated 8 years ago
- Grab the content of lots of websites in parallel☆18Jan 21, 2024Updated 2 years ago
- ☆20Jul 14, 2024Updated last year
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Compares the speed and package size of various ECMAScript parsers and code generators.☆14Oct 11, 2025Updated 5 months ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Assistant/watchdog for Counterstake Bridge https://counterstake.org☆13Dec 26, 2025Updated 2 months ago
- Mirror of offical kismet-docs repo from kismetwireless.net☆22Dec 16, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Concurrent, sequential, functional transformations along Golang channels.☆24Jan 29, 2014Updated 12 years ago
- A helpful gpt-based triage tool for BugCrowd bugbounty programs.☆51Nov 3, 2023Updated 2 years ago
- ☆19May 24, 2022Updated 3 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆34Nov 27, 2025Updated 3 months ago