9b / lazyeye
Chrome extension to extract data from websites surfed inside of chrome
☆18Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for lazyeye
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Search bing with python☆11Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Format string exploit generation☆9Updated 9 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Awesome little automater☆17Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 9 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- An application for distributing oclHashcat tasks.☆21Updated 9 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Virtual host brute forcer☆22Updated 10 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- A web app scanner☆26Updated 10 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago