abednarek-isearchive / MultipassLinks
Password manager credential recovery tool
☆20Updated 6 years ago
Alternatives and similar repositories for Multipass
Users that are interested in Multipass are comparing it to the libraries listed below
Sorting:
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Updated last year
- Nix Audit made easier (RHEL, CentOS)☆65Updated 6 months ago
- RuraSort - A utility to sort and streamline wordlists.☆28Updated 5 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- async mass DNS resolver☆82Updated last year
- ☆18Updated last year
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Updated 8 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- A collection of hashcat-hcstat files☆33Updated 7 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Search public IP owner through ARIN☆59Updated 5 months ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Hastopolis Server Docker image☆19Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Collection of rules and debug data for hashcat☆20Updated 8 years ago
- Scripts for automating actions in Cobalt Strike☆11Updated 9 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 13 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago