jthomas / serverless-pwned-passwordsView external linksLinks
Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from security breaches.
☆114Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for serverless-pwned-passwords
Users that are interested in serverless-pwned-passwords are comparing it to the libraries listed below
Sorting:
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60May 16, 2019Updated 6 years ago
- xast: ast rewriter with built-in clean up.☆27Aug 31, 2017Updated 8 years ago
- Simple library for working with passwords in Go (golang).☆13Feb 18, 2016Updated 9 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Deep learning spelling patterns with a recurrent neural network☆12Jun 5, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- Open source offensive security platform for red team, by red team.☆386Oct 23, 2017Updated 8 years ago
- A startup search engine made using embeddings built on crunchbase company descriptions☆11Dec 2, 2015Updated 10 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- A Rust crate for writing AWS Lambdas that are triggered by SQS☆17Dec 26, 2022Updated 3 years ago
- 🏠 Explode one-line address strings using Golang☆53Aug 31, 2022Updated 3 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Finds common flaws in passwords. Like cracklib, but written in Go.☆379Sep 26, 2023Updated 2 years ago
- Appengine Datastore Mapper in Go☆21Mar 20, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- A tool to easily observe changed/added/removed symbols between different versions of go program☆16May 28, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Jun 10, 2022Updated 3 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 8 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago