ignis-sec / Pwdb-PublicLinks
A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,175Updated 5 years ago
Alternatives and similar repositories for Pwdb-Public
Users that are interested in Pwdb-Public are comparing it to the libraries listed below
Sorting:
- A Workflow Engine for Offensive Security☆5,841Updated last week
- A collection of custom security tools for quick needs.☆3,228Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,585Updated 5 months ago
- 🔪 Leak git repositories from misconfigured websites☆1,583Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,192Updated 2 weeks ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,221Updated 2 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,836Updated 8 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,368Updated 5 months ago
- Potentially dangerous files☆3,204Updated 4 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,898Updated 2 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,544Updated last week
- Network Analysis Tool☆3,271Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.☆3,243Updated 3 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,616Updated last year
- Attack Surface Management Platform☆8,973Updated 2 months ago
- A Tool for Domain Flyovers☆5,836Updated 3 years ago
- All In One Web Recon☆2,503Updated 3 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,607Updated 2 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,351Updated last week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,881Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆1,372Updated 5 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,137Updated 2 months ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,374Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,718Updated last week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,274Updated 10 months ago
- Find web directories without bruteforce☆1,892Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,897Updated last year
- Monitor linux processes without root permissions☆5,606Updated 2 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,410Updated this week