credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directories into a searchable database. MongoDB is used in the backend.
☆65May 13, 2021Updated 4 years ago
Alternatives and similar repositories for credshed
Users that are interested in credshed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- Polite, slim and concurrent web crawler.☆14Nov 29, 2020Updated 5 years ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Apr 1, 2026Updated last week
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆12Apr 20, 2023Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last week
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- CoreDNS plugin implementing a shared cache using Redis☆17May 11, 2023Updated 2 years ago
- Linkedin Employee Profile Scrapper☆68Oct 18, 2023Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Frack - Keep and Maintain your breach data☆385Sep 1, 2024Updated last year
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.☆20Jul 17, 2022Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- public dns server list for dmut project☆18Nov 30, 2023Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- This iOS application uses iOS 4.x Significant Location Change API to log your location to an SQLite file which you can then export via em…☆20Aug 26, 2011Updated 14 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Documentation for Snusbase and the Snusbase API.☆24Feb 8, 2026Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,481Apr 1, 2026Updated last week
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated last week
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 6 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆16May 15, 2021Updated 4 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Jun 23, 2021Updated 4 years ago
- Web Crawler and Scraper☆12Jul 6, 2022Updated 3 years ago
- Vulnerability Management tool using the CVE-Search database☆10Apr 22, 2016Updated 9 years ago
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated last week
- ☆14Sep 22, 2019Updated 6 years ago