ignis-sec / Pwdb-PublicLinks
A collection of all the data i could extract from 1 billion leaked credentials from internet.
☆3,190Updated 5 years ago
Alternatives and similar repositories for Pwdb-Public
Users that are interested in Pwdb-Public are comparing it to the libraries listed below
Sorting:
- A Workflow Engine for Offensive Security☆5,903Updated last month
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,924Updated 7 months ago
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,876Updated 9 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,290Updated last year
- A collection of custom security tools for quick needs.☆3,243Updated 2 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,197Updated 3 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,536Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,263Updated 4 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,668Updated 2 years ago
- Potentially dangerous files☆3,217Updated last month
- Find open databases - Powered by Binaryedge.io☆1,379Updated 5 years ago
- All In One Web Recon☆2,525Updated 5 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,600Updated 7 months ago
- 🔪 Leak git repositories from misconfigured websites☆1,585Updated 2 years ago
- Search for leaked credentials☆1,357Updated 4 years ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,579Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,893Updated 3 years ago
- Attack Surface Management Platform☆9,098Updated last week
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,437Updated last year
- Network Analysis Tool☆3,284Updated 2 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,950Updated 2 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,241Updated 3 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,302Updated 3 weeks ago
- Image Payload Creating/Injecting tools☆1,261Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,367Updated this week
- A Tool for Domain Flyovers☆5,855Updated 3 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,254Updated last year
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,384Updated last year
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,923Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,383Updated 7 months ago