4m3rr0r / BreachHunterLinks
BreachHunter is a powerful OSINT (Open Source Intelligence) tool designed for cybersecurity professionals, investigators, and ethical hackers to efficiently search for leaked data using the DeHashed API
☆16Updated 2 months ago
Alternatives and similar repositories for BreachHunter
Users that are interested in BreachHunter are comparing it to the libraries listed below
Sorting:
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆44Updated 11 months ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆36Updated last year
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆34Updated 6 months ago
- POC | Steal user WhatsApp information/data☆73Updated 6 months ago
- A tool for automatically change the Tor IP address over time.☆115Updated 7 months ago
- A simple Ransomware Generator☆51Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆42Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆54Updated last month
- Cyber stalker is a web application based tool to catch fake account users online☆18Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆47Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆59Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆67Updated 4 years ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆162Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated last month
- Redirect All Traffic Through Tor Network For Kali Linux☆206Updated 8 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- Bypass 403☆163Updated 9 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆56Updated 10 months ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Updated 4 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆93Updated 2 years ago
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with mu…☆77Updated 6 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆84Updated 6 months ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆40Updated 6 months ago
- PrivacyNet: Privacy Network☆52Updated last year
- ☆28Updated 4 years ago
- URLs very strong obfuscation tool (can be used in requests too)☆16Updated last year
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆42Updated 11 months ago