Catalog of security breaches
☆24Mar 15, 2025Updated last year
Alternatives and similar repositories for SecurityBreach
Users that are interested in SecurityBreach are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Simple class for driving a st7735s LCD display in python 3☆11Nov 1, 2018Updated 7 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 10 months ago
- AI agent set for cloud security purple teaming, runs inside Claude Code, Gemini CLI, and Codex.☆43Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Python project of the Raspberry Pi to control character LCD or OLED(SSD1311 controller) module via I2C protocol with button events. It …☆10Oct 16, 2018Updated 7 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- This script will help help you to get the most of router in morocco by using pixiewps , reaver , aircrack-ng ,wifite☆11Sep 12, 2015Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Go channel providing live tweets containing search terms.☆35Jul 5, 2017Updated 8 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Microsoft Azure Security Engineer Associate (AZ-500) Study Notes☆28Jun 13, 2023Updated 2 years ago
- Show your Raspberry Pi stats on an i2c OLED display. e.g. IP address, CPU load, memory usage, SD usage and temperature☆12Feb 3, 2019Updated 7 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- sync google contacts with information from the dominos data breach <3☆11May 24, 2021Updated 4 years ago
- A means of archving the files that were leaked on Wikileaks as a backup. These are downloaded to the best of my abilities to try and coll…☆39Jan 10, 2024Updated 2 years ago
- Rust Extensions for the Ruby gem case_transform☆10Jul 27, 2017Updated 8 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11May 19, 2017Updated 8 years ago
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- Anonymously check if an email sender has ever been compromised in a security breach. Service provided by https://hacked-emails.com/☆14Apr 13, 2018Updated 7 years ago
- MASLOW: an Open WiFi Detector with ESP8266☆23Dec 21, 2015Updated 10 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- Python scripts to be used with the Adafruit 2.23" Monochrome OLED Bonnet and RPi☆16Oct 15, 2024Updated last year
- My personnal notes on the P4wnP1☆18Feb 18, 2024Updated 2 years ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MappingInjection via csharp☆40Nov 19, 2021Updated 4 years ago
- A Cracking Tool for open Wifis with login pages☆22May 2, 2013Updated 12 years ago
- Rust bindings to the Vectorscan high-performance regex library☆19Mar 13, 2026Updated last week
- Go crypto.Signer and crypto.Decrypter that uses AWS KMS asymmetric keys☆11Jan 2, 2024Updated 2 years ago
- An implementation of pstree in rust based on the exercise from TLPI☆15Mar 18, 2016Updated 10 years ago
- ☆16Jul 18, 2020Updated 5 years ago
- Module PMKIDAttack v1.2 for WiFi Pineapple☆18Apr 8, 2019Updated 6 years ago