ignis-sec / Pwdb-PublicLinks
A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,184Updated 5 years ago
Alternatives and similar repositories for Pwdb-Public
Users that are interested in Pwdb-Public are comparing it to the libraries listed below
Sorting:
- A Workflow Engine for Offensive Security☆5,880Updated last month
- A collection of custom security tools for quick needs.☆3,238Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,284Updated 11 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,845Updated 8 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,916Updated 6 months ago
- All In One Web Recon☆2,521Updated 4 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,676Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,216Updated last month
- Potentially dangerous files☆3,208Updated 3 weeks ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,597Updated 6 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,230Updated 3 months ago
- Attack Surface Management Platform☆9,029Updated 3 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,137Updated 6 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,192Updated 3 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,679Updated 3 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,563Updated this week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,302Updated 2 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,650Updated 2 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,531Updated last year
- In-depth attack surface mapping and asset discovery☆13,537Updated last week
- Search for leaked credentials☆1,355Updated 4 years ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,432Updated last year
- NSE script based on Vulners.com API☆3,332Updated 3 months ago
- A Tool for Domain Flyovers☆5,847Updated 3 years ago
- Fast passive subdomain enumeration tool.☆12,262Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,360Updated last month
- File upload vulnerability scanner and exploitation tool.☆3,254Updated 4 months ago
- Network Analysis Tool☆3,278Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,363Updated 10 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,887Updated 2 years ago