l4rm4nd / DehashedDumper
Python3 script to dump breach data from Dehashed
☆28Updated 9 months ago
Alternatives and similar repositories for DehashedDumper:
Users that are interested in DehashedDumper are comparing it to the libraries listed below
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆41Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 9 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆94Updated 9 months ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆72Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 9 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆12Updated 4 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 6 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆20Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆104Updated last year
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆33Updated 2 months ago
- Social Engineering Browser Update Attack.☆57Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆34Updated last month
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆17Updated 10 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Ransomware groups posts☆39Updated this week
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆17Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago