LoomisLoud / onion-crawler
Tor website crawler (specific for Alphabay at the time)
☆22Updated 4 years ago
Alternatives and similar repositories for onion-crawler:
Users that are interested in onion-crawler are comparing it to the libraries listed below
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆11Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A Gmail credential harvester☆10Updated 8 months ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- Python wrapper for the Mitre ATT&CK framework API☆26Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- Infecting PE☆24Updated 10 years ago
- An Amazon OSINT scraper for potential scam accounts☆34Updated 6 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆34Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆24Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- The MacOS ransomware project☆14Updated 7 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago