ElevenPaths / netoLinks
Neto | A tool to analyse browser extensions
☆88Updated 5 years ago
Alternatives and similar repositories for neto
Users that are interested in neto are comparing it to the libraries listed below
Sorting:
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆145Updated 3 weeks ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- scythe: account enumerator☆61Updated 12 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- Ruby based reverse IP-lookup tool.☆56Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago
- Unofficial WhatCMS API package☆40Updated 4 years ago
- Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.☆33Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- Truehunter☆30Updated 4 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- A tool to generate media files with malicious metadata☆127Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆101Updated 2 years ago