ignis-sec / Pwdb-PublicLinks
A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,213Updated 5 years ago
Alternatives and similar repositories for Pwdb-Public
Users that are interested in Pwdb-Public are comparing it to the libraries listed below
Sorting:
- A Workflow Engine for Offensive Security☆6,009Updated 4 months ago
- A collection of custom security tools for quick needs.☆3,277Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,620Updated 2 weeks ago
- Potentially dangerous files☆3,257Updated 4 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,970Updated last year
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,324Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,352Updated 2 weeks ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,917Updated 3 years ago
- A script that you can run in the background!☆2,935Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,473Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,284Updated 7 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,653Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,851Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,412Updated 3 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,230Updated 6 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,393Updated 10 months ago
- A Tool for Domain Flyovers☆5,891Updated 3 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,393Updated last year
- ☆2,353Updated 2 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,788Updated last week
- All In One Web Recon☆2,584Updated 8 months ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,936Updated last month
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,520Updated 2 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,282Updated 6 months ago
- A swiss army knife for pentesting networks☆9,015Updated 2 years ago
- Monitor linux processes without root permissions☆5,823Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,879Updated 4 years ago
- Fancy reverse and bind shell handler☆2,860Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,711Updated this week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,585Updated 2 weeks ago