zxsecurity / steamer
For importing, searching, and managing public password breach data
☆161Updated last year
Alternatives and similar repositories for steamer:
Users that are interested in steamer are comparing it to the libraries listed below
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- myBFF - a Brute Force Framework☆140Updated 2 months ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- ☆224Updated 10 months ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 8 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆167Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 2 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆146Updated 6 years ago
- ☆105Updated 5 years ago
- Generate Keyboard Walk Dictionaries for cracking☆146Updated 9 years ago
- Rogue AP killer☆89Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated 10 months ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆124Updated 6 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 10 years ago
- ☆241Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- penetration testing scripts☆136Updated 5 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- locate and attack Lync/Skype for Business☆337Updated 7 months ago