VoidSec / Combination-of-many-breaches
TOP 40 - 1.4 Billion Clear Text Credentials
☆26Updated 7 years ago
Alternatives and similar repositories for Combination-of-many-breaches:
Users that are interested in Combination-of-many-breaches are comparing it to the libraries listed below
- OSCP Notes written from PWK Course☆46Updated 3 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆143Updated 3 years ago
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆72Updated last month
- Create visualization from Shodan query☆72Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆59Updated 3 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆55Updated 4 years ago
- recon-ng modules for Censys☆36Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆42Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 4 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆69Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Shodan Port Scanner☆42Updated 4 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 7 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆41Updated 5 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆72Updated 2 years ago
- ☆32Updated 5 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 4 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆39Updated 7 months ago
- Modern problems require modern solutions☆31Updated 2 years ago