Github Hunter rewritten by Golang and add new features
☆22Oct 10, 2019Updated 6 years ago
Alternatives and similar repositories for Github_Hunter_By_Golang
Users that are interested in Github_Hunter_By_Golang are comparing it to the libraries listed below
Sorting:
- Browser interface to Telegram's API with additional modules for generating datasets and network graphs☆13Dec 31, 2023Updated 2 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆40Aug 13, 2019Updated 6 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Jan 8, 2023Updated 3 years ago
- Shodan Favicon Hash Generator By Aziz Hakim @eternyle☆26May 25, 2024Updated last year
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆19Feb 15, 2023Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Domain Blocklist☆10Aug 21, 2024Updated last year
- Advance phishing tool☆13Sep 25, 2020Updated 5 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 11 months ago
- Sample API CRUD Golang And Gin☆10Aug 11, 2020Updated 5 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated 2 months ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- A Network Automation framework focused on Cyber-Security☆46Jul 6, 2023Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- ☆10May 29, 2023Updated 2 years ago
- Python script that types out the text that exists in clipboard.☆12Mar 31, 2025Updated 11 months ago
- Clickme is a powerful multi-step clickjacking tool designed for security professionals. Create, visualize, and demonstrate complex clickj…☆14Sep 4, 2025Updated 6 months ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- RSA cracking algorithm based on Pollard factorization (Pollard's p-1 method).☆15Jun 28, 2023Updated 2 years ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆58Dec 3, 2021Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆29Nov 18, 2025Updated 3 months ago