Skip to content
#

credential-stuffing

Here are 19 public repositories matching this topic...

A hands-on security lab demonstrating how weak authentication code can be exploited and how to harden it. Includes a vulnerable Flask login page and an attacker script to simulate brute-force credential stuffing. Learn common auth flaws, defensive coding practices, and concrete steps to secure real-world apps.

  • Updated Oct 1, 2025
  • Python

This script looks at a Email:password wordlist and Then attempts to locate the Imap server for the domains remaining. If a imap server responds the script will try to login via imap; if successful a hit will be logged in your results text file.

  • Updated May 1, 2025
  • Python

Improve this page

Add a description, image, and links to the credential-stuffing topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the credential-stuffing topic, visit your repo's landing page and select "manage topics."

Learn more