boobsnail
DefaultCreds-cheat-sheet
boobsnail | DefaultCreds-cheat-sheet | |
---|---|---|
1 | 2 | |
252 | 5,266 | |
0.0% | - | |
3.9 | 7.5 | |
almost 3 years ago | 7 days ago | |
Python | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
boobsnail
DefaultCreds-cheat-sheet
- Database of default usernames and passwords?
-
Wordlists
If looking for a tool that searching default creds : https://github.com/ihebski/DefaultCreds-cheat-sheet
What are some alternatives?
macro_pack - macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
SecLists - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
SlackPirate - Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
my-wordlists - wordlists i use for testing security/security testing or whatever you want to call it
NIST-to-Tech - An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
swaggerHole - A python3 script searching for secret on swaggerhub
PowerShell-Obfuscation-Bible - A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
mssql-spider - Automated exploitation of MSSQL servers at scale
mongoaudit - ๐ฅ A powerful MongoDB auditing and pentesting tool ๐ฅ
powershell_commands - Personal sheet for PowerShell ๐งข
weird_proxies - Reverse proxies cheatsheet
Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).