☁️ LeakIX API Client (Unofficial)
☆21Nov 16, 2025Updated 3 months ago
Alternatives and similar repositories for LeakPy
Users that are interested in LeakPy are comparing it to the libraries listed below
Sorting:
- Random Scan for ETH Addresses and Transactions☆11Aug 9, 2021Updated 4 years ago
- Monitoring script to plunder eth sent to addresses with known private keys☆12Dec 13, 2021Updated 4 years ago
- A Simple JS and PHP Botnet☆30Mar 12, 2019Updated 6 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Using this extension you will be able to inject Javascript codes into webpages, in order to customize your most visiting websites, to hav…☆25Feb 10, 2024Updated 2 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Random Ethereum&Binance Coin addresses and Private Keys Online API☆17Aug 12, 2021Updated 4 years ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- Web Parameter Crawling Tool☆37Feb 21, 2026Updated last week
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 4 months ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆22Jan 3, 2026Updated last month
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆34Feb 20, 2026Updated last week
- Nmap & SQL injection automation tool☆39Oct 14, 2024Updated last year
- Put All Mirror in ONE☆12Feb 18, 2026Updated last week
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 10 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Material-Inspired Component Library☆21Feb 17, 2026Updated last week
- Quick and dirty script to parse bplists with Ruby☆13Oct 29, 2020Updated 5 years ago
- 403 Bypasser With auto payload generation☆12Aug 8, 2024Updated last year
- ☆10May 29, 2023Updated 2 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- ☆10Jan 25, 2023Updated 3 years ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 7 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A Python script developed to automate the process of extracting public information from TikTok accounts for OSINT.☆12Dec 14, 2024Updated last year
- An HTTP proxy designed to perform MITM phishing attacks, allowing users to inject JavaScript payloads into the victim's browser in the ba…☆15Feb 2, 2025Updated last year