nyxxxie / awesome-default-passwords
An organized collection of default passwords for various devices and services.
☆34Updated last year
Related projects ⓘ
Alternatives and complementary repositories for awesome-default-passwords
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆32Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- Personal Collection of Awesome Google Dorks☆29Updated 5 years ago
- Scripts related to offensiveosint.io☆20Updated 4 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Search .git folders for emails and URL's that should otherwise be hidden☆28Updated 3 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- recon-ng modules for Censys☆36Updated last year
- Command List for Hashcat and default keyspaces.☆14Updated 4 years ago
- An Extended, Modulair, Host Discovery Framework☆43Updated 5 years ago
- Unofficial WhatCMS API package☆43Updated 3 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- A collection of personal ZAP scripts☆13Updated last year
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆17Updated last month
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- ☆34Updated 6 years ago
- Get trails tool: Get all urls indexed of target☆21Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆23Updated 6 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 9 years ago