moloch-- / leakdb
Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search
☆182Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for leakdb
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆182Updated 4 years ago
- LinkedIn reconnaissance tool☆48Updated 2 years ago
- automated password spraying tool☆147Updated 3 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆330Updated 5 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆62Updated 2 years ago
- ☆147Updated last year
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆185Updated 4 months ago
- A framework for stealthy domain reconnaissance☆293Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆214Updated 3 years ago
- Microsoft External Attack Tool☆177Updated last year
- Pivoting Frontend for Pre-Seeded Password Databases☆118Updated 2 years ago
- easy-to-use payload hosting☆264Updated 2 years ago
- Protocol agnostic online password guessing API.☆79Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆208Updated 3 years ago
- Simple parser framework.☆24Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Resolves an IP address to the cloud provider it is hosted on☆92Updated this week
- SNIcat☆125Updated 3 years ago
- Passive internal reconnaissance tool☆67Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 2 years ago
- ☄️ go-out - A Golang egress buster.☆123Updated 11 months ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆452Updated 7 months ago
- User enumeration with Microsoft Teams API☆166Updated 3 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Lure - User Recon Automation for GoPhish☆158Updated last year
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆84Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆221Updated 4 years ago
- Burp with Friends☆99Updated last year