Password Breach API Server
☆88Jul 2, 2025Updated 8 months ago
Alternatives and similar repositories for passdb-backend
Users that are interested in passdb-backend are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pivoting Frontend for Pre-Seeded Password Databases☆134Nov 19, 2025Updated 4 months ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Links to various data breaches & data leaks☆46Apr 7, 2024Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 9 months ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- ⚖️ R code to scrape the DoJ Capitol Breach Cases and daily data files of said scraped info via GH actions☆24Nov 6, 2024Updated last year
- ☆16Jun 1, 2018Updated 7 years ago
- Short handy snippets from the @mwrlabs team☆20Jan 30, 2018Updated 8 years ago
- ☆19Jan 12, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Frack - Keep and Maintain your breach data☆385Sep 1, 2024Updated last year
- ☆26Jun 2, 2022Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- ☆29May 10, 2024Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23Mar 17, 2024Updated 2 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆53Nov 18, 2024Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 2 months ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- ☆16Dec 7, 2025Updated 3 months ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 9 months ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Jan 4, 2024Updated 2 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆137Nov 27, 2019Updated 6 years ago