XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
☆145Jan 5, 2020Updated 6 years ago
Alternatives and similar repositories for XposedOrNot
Users that are interested in XposedOrNot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆13Jan 3, 2018Updated 8 years ago
- Perform automated network reconnaissance scans☆240May 4, 2023Updated 3 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆128May 22, 2023Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- A curated list of amazingly awesome OSINT☆17Jul 12, 2018Updated 7 years ago
- ✨ Monitor twitter stream from nodejs electron☆271May 19, 2021Updated 4 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆26Apr 20, 2014Updated 12 years ago
- ☆25May 9, 2021Updated 4 years ago
- Get teamviewer's ID and password from a remote computer in the LAN☆136Mar 6, 2020Updated 6 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Dec 5, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆143Apr 29, 2019Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️☆286Oct 18, 2023Updated 2 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- Maltego compilation of various assets, local transforms and helpful scripts☆156Aug 15, 2018Updated 7 years ago
- Pwndb request API☆24Jul 9, 2020Updated 5 years ago
- Node Cellar fork from https://github.com/ccoenraets/nodecellar with some security fixes☆14Jun 12, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Jan 15, 2021Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 8 months ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC☆34Jul 13, 2023Updated 2 years ago
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- Simple Captive Portal for Evil Crow Keylogger: Access point (Free WiFi) with a registration form. Information is stored on the MicroSD ca…☆13Oct 6, 2020Updated 5 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆140Oct 17, 2022Updated 3 years ago