A-poc / certSniff
A certificate transparency log keyword sniffer written in python
☆77Updated last year
Alternatives and similar repositories for certSniff:
Users that are interested in certSniff are comparing it to the libraries listed below
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆93Updated 6 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆100Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Mass bruteforce authentication of common services with common credentials.☆45Updated last year
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 5 months ago
- Pentest/Red Team: Resources, repos and scripts.☆65Updated 3 weeks ago
- Kali Packerge Manager☆57Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆42Updated 3 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 2 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Chrome extension tool for OSINT & Recon☆51Updated 11 months ago
- ☆61Updated 9 months ago
- RedTeam - Red Team Tools☆41Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- ☆56Updated last year
- Gmail/GSuite account enumeration tool☆51Updated 11 months ago
- PassBreaker☆56Updated 10 months ago
- Discovering Typo Squatting on your domains!☆64Updated 6 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆102Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆57Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year