VoidSec / Combination-of-many-breaches
TOP 40 - 1.4 Billion Clear Text Credentials
☆25Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Combination-of-many-breaches
- Information-Gathering Shell Script☆29Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆56Updated 3 years ago
- Dehashed API CLI☆19Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- A data breach parser written in python☆16Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆96Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆18Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆56Updated 9 years ago
- An Instagram Open Source Intelligence Tool☆20Updated 5 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆52Updated 6 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆71Updated 2 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆61Updated 2 years ago
- Fraud prevention tool☆28Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆34Updated 9 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 5 years ago
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆18Updated 5 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Updated 4 years ago
- Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different technique…☆40Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆15Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆76Updated 5 years ago
- Automatically run and save ffuf scans for multiple IPs☆75Updated 8 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆10Updated 5 years ago
- Modern problems require modern solutions☆31Updated 2 years ago