ElevenPaths / netoLinks
Neto | A tool to analyse browser extensions
☆88Updated 5 years ago
Alternatives and similar repositories for neto
Users that are interested in neto are comparing it to the libraries listed below
Sorting:
- Extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers☆143Updated last month
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Leak File Analyzer☆63Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 3 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Updated 7 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 8 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Updated 2 years ago
- scythe: account enumerator☆61Updated 12 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Truehunter☆30Updated 4 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- Unofficial WhatCMS API package☆40Updated 4 years ago
- Quickly check credentials against multiple websites and identify instances of credential reuse☆106Updated 9 years ago
- A tool to generate media files with malicious metadata☆129Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- My collection of nmap nse modules☆64Updated 6 years ago