23 skills found
kpcyrd / AuthoscopeScriptable network authentication cracker
davidbombal / Ssh BruteforcingSimple Python SSH Brute Forcing (Credential Stuffing)
Laiteux / MilkyA .NET Standard library for pentesting web apps against credential stuffing attacks.
EC-DIGIT-CSIRC / CredentialLeakDBA database for storing, querying and doing stats on credential leaks
linuxchata / Fido2Shark WebAuthn library for .NET. WebAuthn allows users to authenticate with cryptographic key pairs, where the private key remains securely stored on the user's device. This makes authentication resistant to phishing, credential stuffing, and data breaches.
Rootmarm / Sentry 2.0Sentry without the MBA, credential stuffing and brute-force attack tool with many features
jfrazier-eth / Localhost BotnetA localhost implementation of a botnet used to perform a credential stuffing attack
khasinski / AI BouncerAI-powered HTTP attack detection for Rails. Detects SQLi, XSS, credential stuffing, and more using ML embeddings.
noarche / BruteTerminal based credential stuffing tool. Easy to build configs.
5a1r0x / InstaNukeInstagram Penetration Testing and 2FA Detection
paraxialio / EnvyBasic credential stuffing against Phoenix apps
CrackingWithOpenBullet / OpenBullet AnomalyOpenBullet is a webtesting suite that allows to perform requests towards a target webapp and offers a lot of tools to work with the results. This software can be used for scraping and parsing data, automated pentesting, unit testing through selenium and much more. IMPORTANT! Performing (D)DoS attacks or credential stuffing on sites you do not own (or you do not have permission to test) is illegal! The developer will not be held responsible for improper use of this software.
mrhenrike / WordListsForHackingBrazilian pentest wordlists: 1.5M+ passwords, 1.1K+ usernames, 2.4K+ default credential pairs. PT-BR dictionary + cultural phrases + manufacturer defaults. Red team, SOC training, security workshops.
noarche / Imap ReconThis script looks at a Email:password wordlist and Then attempts to locate the Imap server for the domains remaining. If a imap server responds the script will try to login via imap; if successful a hit will be logged in your results text file.
nixer-io / Nixer Spring PluginNixer plugin for Spring framework for protection against credential stuffing attacks
paraxialio / OrruVictim Phoenix app for credential stuffing tutorial
Joe12387 / Chromedriver Credential StuffingA collection of brute forcing code for conducting credential stuffing attacks on popular websites.
0xSums / SVB⚙️ Silverbullet Configs
NaldyXploit-ID / Credential Stuffing CheckerUji Akun Dengan Daftar Kombinasi Credentials Dengan Kontrol Rate.
MrEchoFi / Bcrypt Lib Based Defensive Brute Force Attacks And Credential Stuffing Signup Login Page By this project you will know how to use Bcrypt lib for secure method for password hashing and verification, designed specifically to protect USER CREDENTIALS against brute-force attacks and credential stuffing