christophetd / firepwnedLinks
Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.
☆89Updated 3 years ago
Alternatives and similar repositories for firepwned
Users that are interested in firepwned are comparing it to the libraries listed below
Sorting:
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆125Updated 7 years ago
- Truehunter☆31Updated 4 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 8 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆56Updated 4 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 4 years ago
- My zsh, bash and vim dot files☆68Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆84Updated 6 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Network based protocol fuzzer☆74Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- A tool to generate media files with malicious metadata☆126Updated 6 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated 2 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…