Hostn4me / ctfrLinks
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
☆11Updated 6 years ago
Alternatives and similar repositories for ctfr
Users that are interested in ctfr are comparing it to the libraries listed below
Sorting:
- A simple site cloner☆26Updated 7 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- Facebook phishing page☆10Updated 4 years ago
- facebook bot ,like comment,download phone number, download email adress, delect all friends ...........etc☆20Updated 6 years ago
- A simple Golang program to collect proxies☆12Updated 5 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 11 years ago
- Face-recognition using python 2+ opencv☆7Updated 7 years ago
- Bash script to crack rdp with THC-Hydra☆17Updated 3 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Google chrome extensions downloader coded in python☆15Updated 6 years ago
- Modern Javascript keylogger with web panel☆22Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- A spooky booter for halloween this python script contains a variety of dos attacks and some information gathering (RUN AS ROOT)☆10Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆15Updated 3 years ago
- Reset your Linux password from external pen drive☆19Updated 4 years ago
- hacking tool☆29Updated last year
- Automating the SQL Injection through Google dorks.☆24Updated 2 years ago
- Secure FTP☆11Updated 6 years ago
- A Simple Keylogger☆18Updated 6 years ago
- Scan a URL against a list of dorks to check for vulnerabilities.☆10Updated 8 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 3 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- to grab or steal the password of systemAutomated sticky keys hack. Post exploitation it grabs browser passwords, history, and network pas…☆55Updated 7 years ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆11Updated 3 years ago
- [ Multi Encryption / Decryption ]☆21Updated 5 years ago