A Python client for the HaveIBeenPwned REST API
☆46Oct 21, 2021Updated 4 years ago
Alternatives and similar repositories for PyPwned
Users that are interested in PyPwned are comparing it to the libraries listed below
Sorting:
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Maltego transforms for the ThreatCrowd search API☆47Apr 11, 2018Updated 7 years ago
- Python pcap sanitizer☆22Sep 2, 2022Updated 3 years ago
- ☆19Oct 28, 2018Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- Agent part of Hashtopus☆17Oct 8, 2017Updated 8 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆18Sep 28, 2018Updated 7 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- disthc☆28Jun 9, 2014Updated 11 years ago
- Keep an eye on specific keywords being posted on Twitter☆46Oct 12, 2015Updated 10 years ago
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- Funk is a HTTP server implementation of PHPSGI. Implemented the lightweight middlewares, responder components...☆14Jun 3, 2017Updated 8 years ago
- uWSGI plugin for Apple Swift integration☆10Feb 23, 2016Updated 10 years ago
- A Federalist template that uses the U.S. Web Design Standards Jekyll theme☆11Jul 15, 2019Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Create, Delete, List SQL Server Reporting Services Subscriptions using Powershell and SOAP☆10Apr 12, 2018Updated 7 years ago
- Examples of various Ansible Playbooks for Microsoft Windows Server 2016☆10Mar 3, 2019Updated 7 years ago
- Tracking my progress in doing GIS/Geospatial work in Python 3.x☆12May 23, 2016Updated 9 years ago
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- Cobaltstrike Aggressor Scripts☆28May 1, 2017Updated 8 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 2 years ago
- CyberArk Identity API PowerShell Module☆11Apr 15, 2025Updated 11 months ago
- An R package to geolocate IPv4/6 addresses and/or domain names using ip-api.com's API☆23Sep 16, 2016Updated 9 years ago
- Create a new Windows VM on a standalone ESX host☆12Jan 1, 2021Updated 5 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- pyfpds is a python wrapper around the FPDS ATOM feed☆13Mar 1, 2019Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- Virus Total Lookup Script☆14Aug 18, 2015Updated 10 years ago
- Ruby access to the SAM.gov API☆12Mar 25, 2017Updated 8 years ago