0xAmmar / AcquiFinderView external linksLinks
Get acquisitions by scraping titles of crunchbase.
☆15Dec 18, 2024Updated last year
Alternatives and similar repositories for AcquiFinder
Users that are interested in AcquiFinder are comparing it to the libraries listed below
Sorting:
- a medium scraper that you need.☆18Nov 11, 2025Updated 3 months ago
- ☆19Feb 10, 2024Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- Bug bounty domain manager with validation, exports & Redis storage ✨☆29Jun 5, 2025Updated 8 months ago
- Modern real world bug bounty payloads and exploitation techniques with may earn you some $$$.☆29Nov 7, 2023Updated 2 years ago
- collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.☆33Aug 28, 2024Updated last year
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Feb 27, 2023Updated 2 years ago
- ☆12Dec 28, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆116Nov 11, 2024Updated last year
- An enhanced OWASP Testing Guide v4.2 with tips, tricks, and new vulnerabilities not in the OWASP list. Features modular testing, actionab…☆91Feb 9, 2025Updated last year
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆41Apr 18, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- The OWASP Testing Guide v4.2 Checlist [2023]☆13Jan 15, 2023Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆37Jul 27, 2025Updated 6 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 1, 2024Updated 2 years ago
- Chrome extension for automating CSPT discovery☆135Dec 23, 2025Updated last month
- ☆40Jul 24, 2022Updated 3 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 3 years ago
- my dotfiles☆11Jan 11, 2026Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆14Aug 22, 2025Updated 5 months ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago