Ekultek / tadpoleLinks
Download files out of open AWS buckets
☆38Updated 6 years ago
Alternatives and similar repositories for tadpole
Users that are interested in tadpole are comparing it to the libraries listed below
Sorting:
- Determine everything you need to know to about a system☆32Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- log file scrubber☆16Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Simple, hand-picked list of fuzz strings☆32Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- ☆19Updated 10 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆22Updated 6 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 8 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A multi-target URL bruteforcer☆21Updated 6 years ago