{"id":20493917,"url":"https://github.com/qeeqbox/credential-stuffing","last_synced_at":"2026-01-31T17:36:00.078Z","repository":{"id":104218857,"uuid":"483799156","full_name":"qeeqbox/credential-stuffing","owner":"qeeqbox","description":"A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks","archived":false,"fork":false,"pushed_at":"2024-01-29T01:06:15.000Z","size":384,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-01-16T05:55:52.517Z","etag":null,"topics":["credentials","example","infosecsimplified","metadta","qeeqbox","stuffing","visualization","vulnerability"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"agpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/qeeqbox.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-04-20T20:12:19.000Z","updated_at":"2023-06-23T05:44:53.000Z","dependencies_parsed_at":"2024-01-29T02:37:43.034Z","dependency_job_id":"4a65e597-5882-4f59-9d61-eb50ab854a08","html_url":"https://github.com/qeeqbox/credential-stuffing","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fcredential-stuffing","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fcredential-stuffing/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fcredential-stuffing/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/qeeqbox%2Fcredential-stuffing/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/qeeqbox","download_url":"https://codeload.github.com/qeeqbox/credential-stuffing/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":242075504,"owners_count":20068225,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["credentials","example","infosecsimplified","metadta","qeeqbox","stuffing","visualization","vulnerability"],"created_at":"2024-11-15T17:37:25.870Z","updated_at":"2026-01-31T17:35:59.976Z","avatar_url":"https://github.com/qeeqbox.png","language":null,"readme":"\u003cp align=\"center\"\u003e \u003cimg src=\"https://raw.githubusercontent.com/qeeqbox/credential-stuffing/main/credential-stuffing.png\"\u003e\u003c/p\u003e\n\nA threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks.\n\n## Example #1\n1. Threat actor has a stolen username and password pair for a vulnerable\n2. Threat actor uses the same pair for other websites\n\n## Impact\nVary\n\n## Risk\n- Gain unauthorized access\n\n## Redemption\n- Increase the password length\n- Increase password complexity\n- Limit login attempts\n- Implement captcha\n- Multi-factor authentication\n\n## ID\n8456e95b-dae6-44ff-bb2b-75a37e16c0c7\n\n## References\n- [wiki](https://en.wikipedia.org/wiki/brute-force_attack/)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fcredential-stuffing","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fqeeqbox%2Fcredential-stuffing","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fqeeqbox%2Fcredential-stuffing/lists"}