blacklanternsecurity / credshedLinks
credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directories into a searchable database. MongoDB is used in the backend.
☆64Updated 4 years ago
Alternatives and similar repositories for credshed
Users that are interested in credshed are comparing it to the libraries listed below
Sorting:
- Create visualization from Shodan query☆75Updated 4 years ago
- Scrape, Hunt, and Transform names and usernames☆125Updated 3 years ago
- Dehashed API CLI☆21Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- ☆33Updated 11 months ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆82Updated 3 months ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Linkedin Employee Profile Scrapper☆68Updated 2 years ago
- Various scripts and codes☆84Updated 4 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 8 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 9 months ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated 2 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- A proving grounds for young and aspiring BBOT modules☆15Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- Code to check AWS S3 buckets☆17Updated 8 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Updated 4 years ago