u0pattern / Cr3dOv3r
Know the dangers of credential reuse attacks.
☆7Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cr3dOv3r
- ☆18Updated 11 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆35Updated 8 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- pen testing scripts☆9Updated 3 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆31Updated 6 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆20Updated 8 years ago
- Package manager for hackers built by hackers☆35Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 5 months ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- MS17-010☆12Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- tuorial VanillaRAT☆8Updated 5 years ago
- web information gathering / Grab links☆41Updated 5 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- pour plus de tutos veuillez visiter le site☆11Updated 4 years ago