Ekultek / tadpoleLinks
Download files out of open AWS buckets
☆38Updated 6 years ago
Alternatives and similar repositories for tadpole
Users that are interested in tadpole are comparing it to the libraries listed below
Sorting:
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- My collection of nmap nse modules☆64Updated 5 years ago
- log file scrubber☆16Updated 7 years ago
- Search public IP owner through ARIN☆57Updated 2 months ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆83Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- scrapes Linkedin for company employee profiles☆57Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Chrome Crusader☆25Updated 6 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆138Updated 5 years ago