Hunter-How / SupportLinks
☆53Updated 9 months ago
Alternatives and similar repositories for Support
Users that are interested in Support are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆46Updated 4 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆25Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- Nuclei templates for honeypots detection.☆197Updated last year
- A collection of red blue team staff☆46Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆78Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆56Updated last month
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ☆35Updated 4 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆77Updated last week
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆48Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Upload files done during my research.☆164Updated 4 months ago
- Citrix Scanner for CVE-2023-3519☆51Updated 2 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- This is an AD pentest tools collection☆58Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆45Updated 6 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated last year
- AI/LLM local model integration for analysis of reconftw results☆74Updated 3 months ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆39Updated 3 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆118Updated this week