From 37822d02bdc8fa0b6e6975ba86e5dcfb999563c0 Mon Sep 17 00:00:00 2001 From: Edoardo Ottavianelli Date: Sat, 18 May 2024 09:33:46 +0200 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index bf0562c..fedddc9 100644 --- a/README.md +++ b/README.md @@ -318,13 +318,13 @@ A curated list of awesome search engines useful during Penetration testing, Vuln - [LeakCheck.io](https://leakcheck.io/) - Make sure your credentials haven't been compromised - [crackstation.net](https://crackstation.net/) -Massive pre-computed lookup tables to crack password hashes - [HashKiller](https://hashkiller.io/listmanager) - Pre-cracked Hashes, easily searchable -- [Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Use Hudson Rock’s free cybercrime intelligence tools to learn how compromised credentials are impacting your business - [LeakedPassword](https://leakedpassword.com/) - Search across multiple data breaches to see if your pass has been compromised - [BugMeNot](https://bugmenot.com/) - Find and share logins - [Hashes.com](https://hashes.com/en/decrypt/hash) - Decrypt and crack your MD5, SHA1, SHA256, MySQL, MD5 Email, SHA256 Email, and NTLM hashes for free online - [Hashmob](https://hashmob.net/search) - The Largest Password Recovery Community - [WhiteIntel](https://whiteintel.io/) - Check if a company or its customers was victim of an information stealer malware - [ntlm.pw](https://ntlm.pw/) - Instantly look up NTLM hashes and resolve them to plaintext passwords using our database with 8B+ entries +- [Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Use Hudson Rock’s free cybercrime intelligence tools to learn how compromised credentials are impacting your business ### Leaks