VoidSec / Combination-of-many-breachesLinks
TOP 40 - 1.4 Billion Clear Text Credentials
☆28Updated 7 years ago
Alternatives and similar repositories for Combination-of-many-breaches
Users that are interested in Combination-of-many-breaches are comparing it to the libraries listed below
Sorting:
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆123Updated last year
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆76Updated 3 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- Dehashed API CLI☆21Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆210Updated 6 years ago
- Automatic & lightning fast wordpress vulnerability scanner☆46Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆78Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 7 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Shodan Port Scanner☆44Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- A WLAN red team framework.☆155Updated last year
- Automated rogue access point setup tool.☆199Updated 4 years ago
- Customized Password/Passphrase List inputting Target Info☆95Updated 11 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 5 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆208Updated 6 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆98Updated this week
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- Integrated web scraper and email account data breach comparison tool☆78Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago