Busindre / dumpzillaLinks
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆145Updated 4 years ago
Alternatives and similar repositories for dumpzilla
Users that are interested in dumpzilla are comparing it to the libraries listed below
Sorting:
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆151Updated 7 years ago
- penetration testing scripts☆136Updated 6 years ago
- The User Interface for GoCrack☆88Updated last month
- ☆102Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- A toolkit for Security Researchers☆129Updated 6 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆105Updated 9 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- Wavestone's web interface for password cracking with hashcat☆172Updated 4 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆222Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆62Updated 6 years ago