christophetd / firepwnedLinks
Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.
☆88Updated 3 years ago
Alternatives and similar repositories for firepwned
Users that are interested in firepwned are comparing it to the libraries listed below
Sorting:
- Truehunter☆31Updated 4 years ago
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆56Updated 4 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆144Updated 4 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Rogue AP killer☆90Updated 7 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- DNS zone transfer research☆59Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A Upnp exploitation tool.☆106Updated 5 years ago
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Password Hash Identification☆220Updated 11 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- ☆145Updated 9 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago