kevin-hanselman / is_my_password_pwnedView external linksLinks
How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.
☆153Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for is_my_password_pwned
Users that are interested in is_my_password_pwned are comparing it to the libraries listed below
Sorting:
- Windows Remote Post Breach Tool via Telegram☆134Mar 13, 2018Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Linux Memory Cryptographic Keys Extractor☆239May 22, 2023Updated 2 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Modern tactical exploitation toolkit.☆857Nov 8, 2025Updated 3 months ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 7 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆980Aug 1, 2023Updated 2 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- intercepting kali router☆443Aug 31, 2017Updated 8 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Various Tools and Docker Images☆280Apr 26, 2025Updated 9 months ago
- ☆59May 1, 2019Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- 娜迦DEX文件修复程序☆25Aug 3, 2017Updated 8 years ago
- A tool to help you write binary exploits☆610Feb 21, 2019Updated 6 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 7 years ago
- STAN is a sTAtic aNalyser☆38Jul 26, 2017Updated 8 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Jul 20, 2018Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- exploit vulnerable c/c++ programms with buffer overflow attacks☆24Jul 18, 2022Updated 3 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆388Mar 3, 2025Updated 11 months ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago