Credentials Checking Framework
☆53Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for credcheck
Users that are interested in credcheck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- ☆13Dec 30, 2024Updated last year
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- JIRA Secure Attachment Looter☆70Jun 27, 2020Updated 5 years ago
- A simple bash script to remove (purge) unused linux kernels☆11Mar 9, 2017Updated 9 years ago
- A tool to find sensitive keys and passwords in Travis logs☆139Jun 27, 2021Updated 4 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆250Oct 15, 2019Updated 6 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆99Dec 30, 2019Updated 6 years ago
- Endpoint monitor tool☆21Sep 16, 2020Updated 5 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Apr 12, 2024Updated last year
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆279Feb 11, 2021Updated 5 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- A Burp Suite extension which performs checks for cross-domain scripting against the DOM, subresource integrity checks, and evaluates Java…☆26Mar 23, 2022Updated 4 years ago
- Common Web Managers Fuzz Wordlists☆176Jan 2, 2026Updated 2 months ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Code generator for binary parsing☆20Feb 1, 2020Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago