TOP 40 - 1.4 Billion Clear Text Credentials
☆28Dec 12, 2017Updated 8 years ago
Alternatives and similar repositories for Combination-of-many-breaches
Users that are interested in Combination-of-many-breaches are comparing it to the libraries listed below
Sorting:
- WaybackURLS + OtxURLS + CommonCrawl = The Best Results☆22Dec 7, 2019Updated 6 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- ☆11Oct 17, 2024Updated last year
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆10Jul 7, 2023Updated 2 years ago
- ☆12Feb 16, 2023Updated 3 years ago
- AllCrackFBH☆18Apr 25, 2019Updated 6 years ago
- Simple class for driving a st7735s LCD display in python 3☆11Nov 1, 2018Updated 7 years ago
- A multi-platform Unix CLI that prints a symlink's complete chain of targets using absolute paths.☆13Dec 27, 2022Updated 3 years ago
- Movie Streaming Platform☆18Feb 24, 2026Updated 2 weeks ago
- Processing Traefik logs by splitting them into separate folders based on the "ServiceName" field (e.g., "9-service@http") and implementin…☆16Apr 20, 2025Updated 10 months ago
- A simple client/server app to render widgets defined by a JSON file onto a web browser page.☆10Oct 24, 2023Updated 2 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 8 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- 🔑 A service which provides continuous user authentication to web applications, using keystroke dynamics.☆12Oct 24, 2018Updated 7 years ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- EDU token contract that powers the OS.University Network☆11May 26, 2018Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- ☆52Aug 19, 2025Updated 6 months ago
- "News similarity with Natural Language Processing" project code☆12Mar 18, 2023Updated 2 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- PAID TOOLS☆16Aug 1, 2023Updated 2 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Network Honeypot written in Rust☆15Mar 2, 2026Updated last week
- Docktor is a Web App that deploys an easy-to-use kit of analysis and scanning tools.☆13Nov 1, 2023Updated 2 years ago
- Find exposed credentials using GitHub Actions with TruffleHog Enterprise.☆17Nov 21, 2024Updated last year
- ☆14Updated this week
- ☆11May 13, 2024Updated last year
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- sync google contacts with information from the dominos data breach <3☆11May 24, 2021Updated 4 years ago
- ☆13Apr 25, 2024Updated last year