andrew-morris / PUGView external linksLinks
Generate users with "random-ish" realistic passwords or password hashes
☆18Jun 24, 2016Updated 9 years ago
Alternatives and similar repositories for PUG
Users that are interested in PUG are comparing it to the libraries listed below
Sorting:
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- interactive command line interfaces for Python☆13Jan 3, 2021Updated 5 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12May 16, 2016Updated 9 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Jul 1, 2016Updated 9 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Scapy hands-on at #GreHack16☆15Nov 19, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Converts crontab expressions to human-readable descriptions☆25Sep 17, 2018Updated 7 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- Drive/Gmail/Calendar backups☆32Jan 25, 2021Updated 5 years ago
- ☆26May 7, 2016Updated 9 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Jan 16, 2026Updated 3 weeks ago
- ☆10Apr 20, 2022Updated 3 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- ☆11Sep 23, 2025Updated 4 months ago
- Network Cryptography Monitor - using eBPF, written in python☆42Aug 26, 2025Updated 5 months ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 9 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Step definitions to test HTTP clients/servers with godog☆12Dec 2, 2025Updated 2 months ago
- My Lisk, Shift, Ark, Rise, Oxy, Kapu, Oxy redistribution software☆15Jul 27, 2021Updated 4 years ago
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- ☆37Jul 10, 2015Updated 10 years ago