zxsecurity / steamerLinks
For importing, searching, and managing public password breach data
☆162Updated last year
Alternatives and similar repositories for steamer
Users that are interested in steamer are comparing it to the libraries listed below
Sorting:
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Phishing toolkit for red teams and pentesters.☆123Updated 6 years ago
- ☆224Updated 11 months ago
- myBFF - a Brute Force Framework☆140Updated 2 months ago
- Automated Responder/secretsdump.py cracking☆185Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago
- ☆280Updated 4 years ago
- unix wildcard attacks☆133Updated 7 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 5 months ago
- Parser for data dumps Collection #1 / Collection #2-5☆146Updated 6 years ago
- penetration testing scripts☆136Updated 5 years ago
- locate and attack Lync/Skype for Business☆336Updated 7 months ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆167Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227Updated 7 years ago
- ☆151Updated last year
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- ☆105Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- Modified dropbear server which acts as a client and allows authless login☆125Updated 6 years ago