A quick script to install google on linux
☆22Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for loogle
Users that are interested in loogle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- Vagrant VirtualBox environment for conducting an internal network penetration test☆965Jun 5, 2023Updated 2 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆432Feb 2, 2022Updated 4 years ago
- Sample pentest report provided by TCM Security☆1,344Mar 18, 2022Updated 4 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆263Jul 2, 2025Updated 8 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Same Pentest Resume☆143Mar 12, 2020Updated 6 years ago
- ☆81May 4, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆55Jan 22, 2023Updated 3 years ago
- Generate 1337speak based password dictionaries☆12Jul 27, 2018Updated 7 years ago
- A tool for parsing breached passwords☆2,096Mar 21, 2024Updated 2 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆19Jul 3, 2024Updated last year
- Cluster plugin mainly designed to simplify the process of note clustering on mobile devices and work well on PCs ether☆17Mar 29, 2025Updated 11 months ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆19Jun 22, 2022Updated 3 years ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆37Oct 1, 2025Updated 5 months ago
- ☆23Jul 5, 2020Updated 5 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- ☆50Feb 28, 2026Updated 3 weeks ago
- ☆19Sep 26, 2024Updated last year
- Seamlessly integrate Omnivore content into Obsidian for enhanced digital reading and note-taking. Perfect for content management and know…☆23Jan 27, 2024Updated 2 years ago
- My Awesome List☆12Updated this week
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆39Oct 23, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆63Jul 23, 2024Updated last year
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- ☆48Jan 1, 2018Updated 8 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆33Mar 21, 2023Updated 3 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆26Jun 13, 2019Updated 6 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆279Aug 12, 2022Updated 3 years ago