Gr4y-r0se / AthenaLinks
Dehashed API CLI
☆21Updated 5 years ago
Alternatives and similar repositories for Athena
Users that are interested in Athena are comparing it to the libraries listed below
Sorting:
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Various scripts and codes☆84Updated 4 years ago
- ☆33Updated 11 months ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- ☆19Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 8 months ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- Python script to parse JSON data exported from SHODAN nad create IP:PORT list to use with other tools☆25Updated 8 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆21Updated 2 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆24Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated last week
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- Code to check AWS S3 buckets☆17Updated 8 years ago
- ☆13Updated 3 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- ☆30Updated 2 years ago
- Rockyou for web fuzzing☆15Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 3 months ago
- Wordlist generator☆16Updated 5 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated 2 years ago