Python script to verify multiple email addresses for pwnage
☆68Jan 22, 2020Updated 6 years ago
Alternatives and similar repositories for haveibeenpwned
Users that are interested in haveibeenpwned are comparing it to the libraries listed below
Sorting:
- A command line tool to check if a single (or multiple) email addresses have been compromised.☆49Oct 21, 2023Updated 2 years ago
- File/Web Text Scraper and Wordlist Generator☆40Oct 1, 2020Updated 5 years ago
- A Python client for the HaveIBeenPwned REST API☆46Oct 21, 2021Updated 4 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Jan 9, 2018Updated 8 years ago
- Simple Script to query hash databases APIs☆16Oct 27, 2018Updated 7 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆41Apr 10, 2016Updated 9 years ago
- A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.☆25Dec 27, 2016Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆25Jun 13, 2022Updated 3 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Sends public ip through e-mail. Command-line standalone.☆12Sep 22, 2017Updated 8 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- An LDAP based Active Directory user and group enumeration tool☆309Feb 11, 2026Updated last month
- ☆11Jan 18, 2020Updated 6 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- Remotely Triggered Black Hole Configurations☆13Jan 12, 2017Updated 9 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated 2 weeks ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Port scanner in bash☆16Nov 8, 2013Updated 12 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- Scripts to analyze stuff☆147Jul 22, 2025Updated 7 months ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago