noraj / pass-stationView external linksLinks
CLI & library to search for default credentials among thousands of Products / Vendors
☆55Jan 9, 2026Updated last month
Alternatives and similar repositories for pass-station
Users that are interested in pass-station are comparing it to the libraries listed below
Sorting:
- Unicode Security Toolkit☆21Jan 10, 2026Updated last month
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Jul 22, 2021Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated last week
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Default credentials list. 🐱💻 Leave a star if you like this project! (that motivates me)⭐️☆394Sep 6, 2024Updated last year
- The hacker technical cheat sheet☆44Jul 3, 2025Updated 7 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 3 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆19Jun 23, 2024Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Cervantes plataform docker repository☆15Aug 6, 2025Updated 6 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- An organized collection of default passwords for various devices and services.☆42Dec 7, 2022Updated 3 years ago
- FireProx written in Go☆21Apr 13, 2024Updated last year
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago
- Product documentation including admin, user and developer manuals☆11Dec 31, 2025Updated last month
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Jan 22, 2021Updated 5 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- De-authentication attack detector that displays attack information via a React web application dashboard☆19Dec 12, 2022Updated 3 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- ☆21Jan 29, 2026Updated 2 weeks ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Feb 7, 2026Updated last week
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆48Dec 24, 2020Updated 5 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Jul 20, 2023Updated 2 years ago
- ☆23Dec 16, 2020Updated 5 years ago
- Hash type identifier (CLI & lib)☆941Jan 22, 2026Updated 3 weeks ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- Related subdomains finder☆29May 18, 2022Updated 3 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30May 29, 2024Updated last year
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆33Jun 4, 2025Updated 8 months ago