CLI & library to search for default credentials among thousands of Products / Vendors
☆55Jan 9, 2026Updated last month
Alternatives and similar repositories for pass-station
Users that are interested in pass-station are comparing it to the libraries listed below
Sorting:
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Jul 22, 2021Updated 4 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated this week
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Default credentials list. 🐱💻 Leave a star if you like this project! (that motivates me)⭐️☆394Sep 6, 2024Updated last year
- The hacker technical cheat sheet☆45Feb 25, 2026Updated last week
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.☆20Jun 23, 2024Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Cervantes plataform docker repository☆15Aug 6, 2025Updated 7 months ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Product documentation including admin, user and developer manuals☆11Dec 31, 2025Updated 2 months ago
- FireProx written in Go☆20Apr 13, 2024Updated last year
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago
- CVE-2022-2185 poc☆13Jul 12, 2022Updated 3 years ago
- An organized collection of default passwords for various devices and services.☆43Dec 7, 2022Updated 3 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Jan 22, 2021Updated 5 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆24Nov 29, 2020Updated 5 years ago
- ☆21Feb 12, 2026Updated 3 weeks ago
- ☆33Jun 19, 2021Updated 4 years ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Feb 27, 2026Updated last week
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆101Jul 20, 2023Updated 2 years ago
- ☆24Dec 16, 2020Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆123Oct 5, 2024Updated last year
- iWar - The intelligent war dialer.☆29Apr 1, 2020Updated 5 years ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- Displays a list of open listening sockets. It is a minimal alternative to ss or netstat.☆36Jan 10, 2026Updated last month
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Jun 4, 2025Updated 9 months ago