kindredgroup / paf-credentials-checkerView external linksLinks
PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Password Stuffing).
☆18Nov 25, 2019Updated 6 years ago
Alternatives and similar repositories for paf-credentials-checker
Users that are interested in paf-credentials-checker are comparing it to the libraries listed below
Sorting:
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- ☆23Sep 12, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- ☆31Nov 22, 2021Updated 4 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- A tool for refreshing web browsers automatically☆15Sep 22, 2013Updated 12 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆18Mar 14, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- The Paper Artifact Availability☆20Aug 26, 2022Updated 3 years ago
- Block Promoted Ads on Twitter (Works as of June 2022)☆19Jun 23, 2022Updated 3 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Apr 1, 2022Updated 3 years ago
- Go HTTP Strict Transport Security library☆22Oct 3, 2024Updated last year
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 7 months ago
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 6 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago