Powermemory

Exploit the credentials present in files and memory
Alternatives To Powermemory
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Defaultcreds Cheat Sheet5,023
6 months ago2November 28, 2023mitPython
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Powermemory726
4 years ago4otherPowerShell
Exploit the credentials present in files and memory
Mxtract573
3 years ago1mitC++
mXtract - Memory Extractor & Analyzer
Cve 2018 10933494
7 months ago1Python
Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)
Cve 2018 9995_dvr_credentials419
5 years ago4gpl-3.0Python
(CVE-2018-9995) Get DVR Credentials
Swap_digger376
3 years ago1gpl-3.0Shell
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Reosploit39
3 years agomitPython
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Netscraped Exploit23
4 years ago2Python
Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for research only.
Fortigate23
2 years agogpl-3.0Python
Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)
Lehack1919
5 years ago
Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)
Alternatives To Powermemory
Select To Compare


Alternative Project Comparisons
Popular Credentials Projects
Popular Exploitation Projects
Popular Security Categories

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Powershell
Operating System
Microsoft
Attack
Exploitation
Credentials
Hypervisor