Hunter-How / SupportLinks
☆57Updated last year
Alternatives and similar repositories for Support
Users that are interested in Support are comparing it to the libraries listed below
Sorting:
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆73Updated 9 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- Discovering Typo Squatting on your domains!☆79Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- ☆56Updated 11 months ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- This is an AD pentest tools collection☆59Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆64Updated last month
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆84Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆69Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆115Updated 2 years ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆17Updated last year
- Tool for scanning domains for .git directories.☆16Updated 2 years ago
- ☆76Updated last year
- ☆91Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated 2 weeks ago
- Unicode Security Toolkit☆40Updated last year
- External recon toolkit☆54Updated last year
- A collection of red blue team staff☆48Updated 2 years ago
- ☆34Updated 2 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago