andrew-morris / PUGLinks
Generate users with "random-ish" realistic passwords or password hashes
☆18Updated 9 years ago
Alternatives and similar repositories for PUG
Users that are interested in PUG are comparing it to the libraries listed below
Sorting:
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- ☆12Updated 8 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- ☆17Updated 10 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 8 years ago
- ☆27Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆10Updated 7 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- YAPDNS☆39Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago