nyxxxie / awesome-default-passwords
An organized collection of default passwords for various devices and services.
☆38Updated 2 years ago
Alternatives and similar repositories for awesome-default-passwords:
Users that are interested in awesome-default-passwords are comparing it to the libraries listed below
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 6 years ago
- Spaghetti - Web Application Security Scanner☆19Updated 7 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- E-mails, subdomains and names Harvester - OSINT☆10Updated 5 years ago
- Information-Gathering Shell Script☆30Updated 4 years ago
- The Last Web Recon Tool You'll Need☆17Updated 4 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆23Updated 2 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- ☆18Updated last year
- List of sources for cybersecurity news☆36Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Payloads and Lists☆21Updated 5 years ago
- Top password lists generated from leaks collected from different paste sites☆30Updated 2 years ago
- The hacker technical cheat sheet☆37Updated 2 weeks ago
- ☆33Updated 3 months ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆8Updated 5 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Scripts related to offensiveosint.io☆21Updated 4 years ago