Password manager credential recovery tool
☆20Feb 20, 2019Updated 7 years ago
Alternatives and similar repositories for Multipass
Users that are interested in Multipass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- A bootrom exploit for MediaTek devices☆20Apr 25, 2023Updated 2 years ago
- ☆10Jun 5, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Script 4 telegram search☆13Aug 25, 2018Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Find websites with script URLs matching given regex☆11Apr 11, 2015Updated 11 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 5 years ago
- A fast TLS Cert scanner to scan HTTPS and SMTP servers☆14Sep 18, 2019Updated 6 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- macOS/OSX hash dump script taken from Empire framework☆13Oct 19, 2018Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- A robust, fast and efficient 'first-class' Python Library for NTLM authentication, signing and encryption☆14Jun 22, 2016Updated 9 years ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Rotate AWS Access Keys and update credentials file☆12Feb 10, 2024Updated 2 years ago
- This is a simple form that uses angular JS to automatically filter for just public Google Docs☆11Aug 21, 2013Updated 12 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Makita lockout flag reset tool based on https://github.com/mnh-jansson/open-battery-information .☆20Nov 13, 2025Updated 5 months ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- CTF Writeups☆27Mar 2, 2017Updated 9 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 10 months ago
- ☆17Feb 28, 2019Updated 7 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 7 months ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Aug 6, 2014Updated 11 years ago
- bender.js provides simple client side stylesheet selection, with cookie persistence and optional mobile browser detection.☆20Aug 28, 2011Updated 14 years ago