AntiScam-Squad / pi-hole
Blacklist for Crypto Wallet scams and Newly Registered Domains
☆9Updated 3 months ago
Alternatives and similar repositories for pi-hole:
Users that are interested in pi-hole are comparing it to the libraries listed below
- This repository contains scrapers programs to scrape hacking forums from Dark web☆50Updated 4 years ago
- Automated sqlmap☆20Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆65Updated 3 weeks ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆66Updated 2 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆45Updated last year
- GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).☆96Updated last year
- Automatically clone websites and patch them with PHP to create phishing pages☆49Updated last month
- Minecraft OSINT tool☆54Updated last year
- Embedding executable files in PDF Documents☆44Updated 5 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆73Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆177Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆60Updated last year
- Discord bot for the Shodan API - OSINT tool☆69Updated 11 months ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆79Updated 5 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆29Updated 2 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆74Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆95Updated 3 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- Searching the TrashPanda OSINT bot API to check if your email/domain or password was leaked or not☆65Updated 3 years ago
- Command Line Sock Puppet Creator for Investigators.☆39Updated 2 weeks ago
- ☆144Updated last year
- Automated hacking tool used to find leaked databases with 97.1% accuracy to grab emails along with their password from recent Pastebin up…☆37Updated last year
- Quidam maltego transform☆40Updated 4 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- Collection Of LolSec☆34Updated 5 years ago
- ☆59Updated last year