noraj / pass-stationView external linksLinks
CLI & library to search for default credentials among thousands of Products / Vendors
☆55Jan 9, 2026Updated last month
Alternatives and similar repositories for pass-station
Users that are interested in pass-station are comparing it to the libraries listed below
Sorting:
- Unicode Security Toolkit☆21Jan 10, 2026Updated last month
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Jul 22, 2021Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Feb 1, 2026Updated last week
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Default credentials list. 🐱💻 Leave a star if you like this project! (that motivates me)⭐️☆394Sep 6, 2024Updated last year
- The hacker technical cheat sheet☆44Jul 3, 2025Updated 7 months ago
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Cervantes plataform docker repository☆15Aug 6, 2025Updated 6 months ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Product documentation including admin, user and developer manuals☆11Dec 31, 2025Updated last month
- FireProx written in Go☆21Apr 13, 2024Updated last year
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- Intelligence gathering framework☆15Jul 23, 2015Updated 10 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Jan 22, 2021Updated 5 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Oct 1, 2016Updated 9 years ago
- ☆33Jun 19, 2021Updated 4 years ago
- ☆21Jan 29, 2026Updated 2 weeks ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Updated this week
- A tool to parse, deduplicate, and query multiple port scans.☆58Aug 11, 2023Updated 2 years ago
- ☆23Dec 16, 2020Updated 5 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆102Jul 20, 2023Updated 2 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Hash type identifier (CLI & lib)☆941Jan 22, 2026Updated 3 weeks ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- iWar - The intelligent war dialer.☆29Apr 1, 2020Updated 5 years ago
- Related subdomains finder☆29May 18, 2022Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A small go tool to upload JSON files to the BloodHound community edition API☆30May 29, 2024Updated last year
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Oled and menu button(GPIO) gestion for P4wnP1 for PI Zero by Mame82☆26Dec 24, 2017Updated 8 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago