sameera-madushan / Pwned
Simple CLI script to check if you have a password that has been compromised in a data breach.
☆54Updated 5 months ago
Alternatives and similar repositories for Pwned:
Users that are interested in Pwned are comparing it to the libraries listed below
- Unique wordlist generator of unique wordlists.☆43Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- ☆33Updated 2 months ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆79Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆27Updated 5 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Turn your VPS into an attack box☆34Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago