ignis-sec / Pwdb-Public
A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,122Updated 4 years ago
Alternatives and similar repositories for Pwdb-Public:
Users that are interested in Pwdb-Public are comparing it to the libraries listed below
- A Workflow Engine for Offensive Security☆5,549Updated 2 months ago
- A Tool for Domain Flyovers☆5,738Updated 2 years ago
- Potentially dangerous files☆3,123Updated 2 weeks ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,399Updated last year
- In-depth attack surface mapping and asset discovery☆12,778Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,422Updated 7 months ago
- A collection of custom security tools for quick needs.☆3,187Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,165Updated 10 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,080Updated 8 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,539Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,189Updated 6 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,245Updated 5 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,397Updated last week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,414Updated 7 months ago
- A swiss army knife for pentesting networks☆8,665Updated last year
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,287Updated 3 months ago
- All In One Web Recon☆2,406Updated 5 months ago
- Windows Exploit Suggester - Next Generation☆4,378Updated last week
- Fast passive subdomain enumeration tool.☆11,480Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,540Updated last month
- Monitor linux processes without root permissions☆5,334Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,098Updated 2 months ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,363Updated 8 months ago
- NSE script based on Vulners.com API☆3,291Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,853Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,744Updated 3 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,275Updated 8 months ago
- Fast web fuzzer written in Go☆13,714Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆6,384Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,481Updated this week