PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Password Stuffing).
☆18Nov 25, 2019Updated 6 years ago
Alternatives and similar repositories for paf-credentials-checker
Users that are interested in paf-credentials-checker are comparing it to the libraries listed below
Sorting:
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- ☆24Sep 12, 2024Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- ☆31Nov 22, 2021Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Python Bindings for Hashtopolis Client API☆18Dec 6, 2023Updated 2 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- A tool for refreshing web browsers automatically☆15Sep 22, 2013Updated 12 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆18Mar 14, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- ☆16Sep 26, 2016Updated 9 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Jun 9, 2018Updated 7 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- The Paper Artifact Availability☆20Aug 26, 2022Updated 3 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- A simple script to read the contents of a zip/tar/folder and extract metadata☆21Oct 6, 2025Updated 5 months ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963☆23Updated this week
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Connect to anyconnect using a docker container☆11Feb 17, 2023Updated 3 years ago
- Determine Who Can Log In to an SSH Server☆30Jun 27, 2025Updated 8 months ago
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 6 years ago