1lastBr3ath / drmineLinks
Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.
☆49Updated 5 years ago
Alternatives and similar repositories for drmine
Users that are interested in drmine are comparing it to the libraries listed below
Sorting:
- Listing subdomains about a main domain☆59Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆82Updated 8 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆112Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- ☆47Updated 10 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Using IPv6 to Bypass Security☆93Updated 2 months ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- Collection of XSS Payloads from various sources☆30Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Some useful tools and scripts☆47Updated 2 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago