Hunter-How / SupportLinks
☆56Updated last year
Alternatives and similar repositories for Support
Users that are interested in Support are comparing it to the libraries listed below
Sorting:
- Citrix Scanner for CVE-2023-3519☆51Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- A collection of red blue team staff☆47Updated 2 years ago
- Discovering Typo Squatting on your domains!☆77Updated last year
- Web Hacking and Red Teaming MindMap☆76Updated 3 months ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆58Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- ☆55Updated 9 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated last week
- Powershell script to help Speed up Threat hunting incident response processes☆43Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- ☆35Updated 7 months ago
- This is an AD pentest tools collection☆59Updated last year
- Manage attack surface data on Elasticsearch☆23Updated last year
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated last month
- A BASH Script to automate the installation of the most popular bug bounty tools☆22Updated last year
- Cloud Exploit Framework☆114Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- Tools used for Pentesting☆21Updated 2 years ago
- External recon toolkit☆53Updated 10 months ago