A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,237Jul 1, 2020Updated 5 years ago
Alternatives and similar repositories for Pwdb-Public
Users that are interested in Pwdb-Public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,360Sep 30, 2024Updated last year
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190May 26, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,170Sep 29, 2021Updated 4 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Extract credentials from lsass remotely☆2,190Mar 23, 2026Updated 2 weeks ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A swiss army knife for pentesting networks☆9,112Dec 6, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,654Aug 28, 2025Updated 7 months ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,560Mar 26, 2026Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,225Sep 29, 2025Updated 6 months ago
- A Tool for Domain Flyovers☆5,918May 22, 2022Updated 3 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,451Mar 28, 2026Updated last week
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,242Oct 4, 2023Updated 2 years ago
- A collection of custom security tools for quick needs.☆3,287May 1, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,539Mar 21, 2026Updated 2 weeks ago
- The Swiss Army knife for automated Web Application Testing☆2,324May 8, 2024Updated last year
- A list of cloud ranges from different providers.☆461Oct 20, 2022Updated 3 years ago
- In-depth attack surface mapping and asset discovery☆14,353Apr 1, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,815Mar 20, 2026Updated 2 weeks ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,144Aug 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,955Feb 28, 2025Updated last year
- Fast web fuzzer written in Go☆15,866Apr 24, 2025Updated 11 months ago
- Making Favicon.ico based Recon Great again !☆1,269Aug 29, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,705Jul 6, 2025Updated 9 months ago
- A collection of hacks and one-off scripts☆2,442Mar 13, 2025Updated last year
- A Modern Orchestration Engine for Security☆6,180Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,670Jan 5, 2026Updated 3 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,093Feb 25, 2026Updated last month
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,613Feb 8, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,554Jan 18, 2026Updated 2 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆660Feb 1, 2025Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- Windows Privilege Escalation from User to Domain Admin.☆1,455Dec 18, 2022Updated 3 years ago
- Windows Exploit Suggester - Next Generation☆4,805Updated this week