gcochard / hibp-downloader
Download all the HIBP passwords
☆12Updated last year
Alternatives and similar repositories for hibp-downloader:
Users that are interested in hibp-downloader are comparing it to the libraries listed below
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- It's like DocBleach, but in your browser☆18Updated 5 years ago
- A list of user agents belonging to common web scanners.☆39Updated 2 years ago
- small library and command line utility that aims to make detecting PII a little easier☆10Updated 6 years ago
- Eddie Vetter - triage macOS applications for security research☆16Updated 3 years ago
- A security.txt parser for PHP☆13Updated 7 years ago
- ☆15Updated 3 years ago
- A low/zero interaction ssh authentication logging honeypot☆20Updated 6 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Updated 4 years ago
- ☆14Updated 3 weeks ago
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆11Updated 6 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆20Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆13Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Hunt for SQLite files used by various applications☆10Updated this week
- Open Source Intelligence☆25Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- ☆15Updated 5 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 6 years ago