sameera-madushan / PwnedLinks
Simple CLI script to check if you have a password that has been compromised in a data breach.
☆55Updated last month
Alternatives and similar repositories for Pwned
Users that are interested in Pwned are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Subdomain Enumeration and Scanner☆33Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- ☆33Updated 5 months ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Unique wordlist generator of unique wordlists.☆42Updated last year
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last week
- Ideaslocas Repository☆37Updated 4 years ago
- ☆53Updated 4 years ago
- ☆30Updated 5 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Updated 7 years ago
- ☆47Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago