CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results and more information such as credential types for each suspicious line. CredData can be used to develop new tools or improve existing tools. Furthermore, using the benchmark result of the CredData, users can ch…
☆80Feb 17, 2026Updated last month
Alternatives and similar repositories for CredData
Users that are interested in CredData are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- UT based automated fuzz driver generation☆169Apr 16, 2025Updated 11 months ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Sample project to build and run Turso's SQLite fork on iOS and use vector search functionality on device☆15Jul 26, 2024Updated last year
- ☆30Nov 29, 2021Updated 4 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- ☆11May 18, 2025Updated 10 months ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Semgrep Pro Rules to ensure code using LLMs is following best practices☆68Mar 25, 2026Updated 2 weeks ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- Technical webinars on reverse engineering, malware analysis, and software protection.☆42Mar 26, 2026Updated 2 weeks ago
- The prototype system of paper Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture.☆29Jan 12, 2023Updated 3 years ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 3 weeks ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Modify ELF executables☆16Mar 5, 2019Updated 7 years ago
- CyberShield 2025 Intro to EDR Evasion Class☆16Jun 3, 2025Updated 10 months ago
- ☆16Dec 21, 2023Updated 2 years ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Golang implementation of a BIP32, BIP44, BIP49 and BIP84 compatible hierarchical determinstic wallet☆14Jul 25, 2018Updated 7 years ago
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆19Oct 15, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆139Jun 7, 2025Updated 10 months ago
- [ACL2024 Findings]DMoERM: Recipes of Mixture-of-Experts for Effective Reward Modeling☆17Jun 6, 2024Updated last year
- (Verilog+MIPS+FPGA MINISYS) (121/100): Single Cycle CPU: Our project of CS202 2023 Spring: Computer Organization, SUSTech. Taught by Prof…☆13Mar 22, 2024Updated 2 years ago
- Common IMAP provider settings☆15Apr 20, 2017Updated 8 years ago
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆34Nov 27, 2025Updated 4 months ago
- Mach-O file format reader, written entirely in Swift☆13May 10, 2020Updated 5 years ago
- Android markets list including official and third-party from China, Russia, ...☆20Mar 23, 2014Updated 12 years ago
- 南方科技大学数字逻辑课程资料: notes, assignments and project☆15Mar 13, 2023Updated 3 years ago
- ASTORIA is a framework developed to allow the simulation of attacks and the evaluation of their impact on Smart Grid infrastructures.☆10Feb 5, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 中文无监督文本聚类☆14Mar 3, 2022Updated 4 years ago
- Ruby library for interacting with the NEO blockchain☆14Apr 23, 2018Updated 7 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆84May 3, 2018Updated 7 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- We introduce FixEval , a dataset for competitive programming bug fixing along with a comprehensive test suite and show the necessity of e…☆26Aug 31, 2022Updated 3 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago