Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
Stars: ✭ 2,529 (+1.28%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (-93.83%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-93.31%)
GopassbridgeA web extension for firefox and chrome to insert login credentials from gopass
Stars: ✭ 182 (-92.71%)
Passw0rd🔑securely checks a password to see if it has been previously exposed in a data breach
Stars: ✭ 159 (-93.63%)
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-93.27%)
Password StrengthAngular UI library to illustrate and validate a password's strength with material design - Angular V9 supported
Stars: ✭ 186 (-92.55%)
Dcipher Cli🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
Stars: ✭ 193 (-92.27%)
LinkfinderA python script that finds endpoints in JavaScript files
Stars: ✭ 2,268 (-9.17%)
MiniprintA medium interaction printer honeypot 🍯
Stars: ✭ 177 (-92.91%)
NgGet password of the wifi you're connected, and your current ip address.
Stars: ✭ 151 (-93.95%)
ApplockerAppLocker - simple lock screen for iOS Application ( Swift 4+, iOS 9.0+) Touch ID / Face ID
Stars: ✭ 188 (-92.47%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (-92.15%)
HacktheboxNotes Taken for HTB Machines & InfoSec Community.
Stars: ✭ 167 (-93.31%)
LeakedLeaked? 2.1 - A Checking tool for Hash codes, Passwords and Emails leaked
Stars: ✭ 184 (-92.63%)
ThreagileAgile Threat Modeling Toolkit
Stars: ✭ 162 (-93.51%)
LibreauthLibreAuth is a collection of tools for user authentication.
Stars: ✭ 201 (-91.95%)
Wifi PassviewAn open source batch script based WiFi Passview for Windows!
Stars: ✭ 157 (-93.71%)
HugeSimple user-authentication solution, embedded into a small framework.
Stars: ✭ 2,125 (-14.9%)
NetpwnTool made to automate tasks of pentesting.
Stars: ✭ 152 (-93.91%)
Pass UpdateA pass extension that provides an easy flow for updating passwords.
Stars: ✭ 191 (-92.35%)
StegcloakHide secrets with invisible characters in plain text securely using passwords 🧙🏻♂️⭐
Stars: ✭ 2,379 (-4.73%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-94.07%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (-8.73%)
Sbt Dependency CheckSBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (-92.51%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-93.15%)
Python ScriptsCollection of Various Python Script's.💻
Stars: ✭ 195 (-92.19%)
Simple ScryptA convenience library for generating, comparing and inspecting password hashes using the scrypt KDF in Go 🔑
Stars: ✭ 168 (-93.27%)
StaticryptPassword protect a static HTML page
Stars: ✭ 2,280 (-8.69%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-93.31%)
Qsfuzzqsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.
Stars: ✭ 201 (-91.95%)
Awesome Shodan Queries🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
Stars: ✭ 2,758 (+10.45%)
JxpatternlockAn easy-to-use, powerful, customizable pattern lock view in swift. 图形解锁/手势解锁 / 手势密码 / 图案密码 / 九宫格密码
Stars: ✭ 165 (-93.39%)
BasecrackDecode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-92.15%)
AsnlookupLeverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (-93.47%)
Android PasscodeviewA custom view with keyboard and character display to be used for authentication
Stars: ✭ 182 (-92.71%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-93.59%)
Secure DesktopAnti-keylogger/anti-rat application for Windows
Stars: ✭ 201 (-91.95%)
Slack WatchmanMonitoring your Slack workspaces for sensitive information
Stars: ✭ 159 (-93.63%)
CrithitTakes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-92.71%)
Awesome Iam👤 Identity and Access Management Knowledge for Cloud Platforms
Stars: ✭ 186 (-92.55%)
UrlcrazyGenerate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-93.99%)
Zydra Stars: ✭ 178 (-92.87%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-93.91%)
RandomaticEasily generate random strings like passwords, with simple options for specifying a length and for using patterns of numeric, alpha-numeric, alphabetical, special or custom characters. (the original "generate-password")
Stars: ✭ 149 (-94.03%)
CuppThe most common form of authentication is the combination of a username
and a password or passphrase. If both match values stored within a locally
stored table, the user is authenticated for a connection. Password strength is
a measure of the difficulty involved in guessing or breaking the password
through cryptographic techniques or library-based automated testing of
alternate values.
Stars: ✭ 2,493 (-0.16%)
Mysql Unsha1Authenticate against a MySQL server without knowing the cleartext password
Stars: ✭ 191 (-92.35%)
Is my password pwnedHow often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.
Stars: ✭ 148 (-94.07%)
Supertokens CoreOpen source alternative to Auth0 / Firebase Auth / AWS Cognito
Stars: ✭ 2,907 (+16.42%)
IkyOSINT Project
Stars: ✭ 203 (-91.87%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-91.91%)
Stormkitty🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.
Stars: ✭ 198 (-92.07%)
Zxcvbn4jThis is a java port of zxcvbn, which is a JavaScript password strength generator.
Stars: ✭ 188 (-92.47%)