Busindre / dumpzillaLinks
Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers
☆143Updated 4 years ago
Alternatives and similar repositories for dumpzilla
Users that are interested in dumpzilla are comparing it to the libraries listed below
Sorting:
- Neto | A tool to analyse browser extensions☆88Updated 4 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team memb…☆216Updated 7 years ago
- The User Interface for GoCrack☆88Updated last week
- Wavestone's web interface for password cracking with hashcat☆170Updated 3 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 9 years ago
- archive of code from http://www.unicornscan.org/☆77Updated 13 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- Rogue AP killer☆90Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- unix wildcard attacks☆135Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Linux setup tool for Kali Linux☆79Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 11 years ago
- tools for analyzing strings from password lists☆59Updated 3 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 7 years ago
- bap - http Basic Authentication honeyPot☆50Updated 10 years ago
- cve-2018-10933 libssh authentication bypass☆108Updated 6 years ago