0n1cOn3 / The-NSO-Blacklist
List of NSO Pegasus's C2C Servers where will be used to control Pegasus.
☆16Updated last year
Alternatives and similar repositories for The-NSO-Blacklist:
Users that are interested in The-NSO-Blacklist are comparing it to the libraries listed below
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- Search for potential emails from your target in Github's public events☆16Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- A curated list of amazingly awesome OSINT☆38Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- Nexus of Android banking Trojans☆15Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆15Updated 7 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 3 months ago
- Terminal based fake identity generator.☆26Updated last year
- ☆9Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆20Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Updated 4 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆33Updated 3 years ago
- Python3 script to dump breach data from Dehashed☆27Updated 8 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ☆27Updated last year
- DNS logging, detection, ...☆15Updated 3 years ago
- Perform OSINT on external targets using Shodan☆21Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆25Updated 6 years ago