l4rm4nd / DehashedDumper
Python3 script to dump breach data from Dehashed
☆24Updated 6 months ago
Alternatives and similar repositories for DehashedDumper:
Users that are interested in DehashedDumper are comparing it to the libraries listed below
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 9 months ago
- Dehashed API CLI☆20Updated 4 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 6 months ago
- Collection of extra pentest tools for Kali Linux☆101Updated last year
- Simple Tool for webhacking☆10Updated last year
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Tactics, Techniques, and Procedures☆25Updated 3 weeks ago
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- Ransomware groups posts☆37Updated this week
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆59Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆24Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆27Updated 4 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆9Updated 4 years ago
- Enumeration & fingerprint tool☆24Updated 11 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆35Updated last week
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆20Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆18Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated 10 months ago
- ☆17Updated last year
- Leaky simplifies the management and visualization of database leak files containing credentials, enhancing efficiency in data analysis an…☆27Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- ☆19Updated 3 years ago
- A repository with informtion related to Cloud Osint☆81Updated 3 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last year
- Modular framework to exploit UPS devices☆63Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year