Hunter-How / Support
☆48Updated 6 months ago
Alternatives and similar repositories for Support
Users that are interested in Support are comparing it to the libraries listed below
Sorting:
- Discovering Typo Squatting on your domains!☆68Updated 9 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆56Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆35Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated 11 months ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- ☆31Updated last month
- This is an AD pentest tools collection☆57Updated 10 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆51Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- AI/LLM local model integration for analysis of reconftw results☆52Updated 2 weeks ago
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated last year
- A collection of red blue team staff☆46Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 3 weeks ago
- ☆55Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆12Updated 3 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- ☆77Updated last year
- ☆55Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆70Updated last year