Check KeePass passwords against https://haveibeenpwned.com/Passwords
☆81Nov 1, 2024Updated last year
Alternatives and similar repositories for kdbxpasswordpwned
Users that are interested in kdbxpasswordpwned are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- 802.11 Exploitation Tool for use with Kali 2. More tools available than WHAT or WHAT Pi☆16Apr 3, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 8 years ago
- PowerShell Empire docker build☆23Jun 27, 2016Updated 9 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- AutoDecoder tool for CTFs☆17Nov 4, 2018Updated 7 years ago
- CSV fuzzer/anonymizer☆10Apr 17, 2026Updated 3 weeks ago
- A writeup for things found and theories regarding the Mr Robot Season 3 ARG☆18Dec 12, 2017Updated 8 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- some config files☆14Feb 23, 2026Updated 2 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 10 months ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- Command line text processing with Rust tools☆20May 14, 2022Updated 3 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 9 years ago
- PHP Unserialize Check - Burp Scanner Extension☆18Mar 15, 2018Updated 8 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Mar 11, 2021Updated 5 years ago
- A jekyll theme with a11y (enhanced by aria markup) and Knacss a little framework css using flexbox☆10Apr 26, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- A better DNS Cache Snooping tool☆19Mar 8, 2025Updated last year
- Mirror of https://git.korhonen.cc/FunctionalHacker/dotfiles☆16Apr 30, 2026Updated last week
- ☆12Oct 3, 2019Updated 6 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 5 months ago
- A collection of tools for researchers using Newspapers.com, including configurable automatic citation generation in five different format…☆12Jun 16, 2024Updated last year
- System service update management made easy☆14Jun 20, 2021Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆14Aug 17, 2018Updated 7 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Generates network traffic summaries.☆23Apr 8, 2026Updated last month
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 5 months ago
- AN ESP32/8266 is used to receive sensor data from clients and then log and display the results☆22Sep 24, 2022Updated 3 years ago
- Basic i3ipc based script to blur an output's wallpaper when a client is present in it☆17Mar 26, 2026Updated last month
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago