Ekultek / tadpole
Download files out of open AWS buckets
☆38Updated 6 years ago
Alternatives and similar repositories for tadpole:
Users that are interested in tadpole are comparing it to the libraries listed below
- Determine everything you need to know to about a system☆31Updated 6 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- A multi-target URL bruteforcer☆21Updated 6 years ago
- ☆19Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 5 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- log file scrubber☆16Updated 6 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 3 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago