Ls4ss / ThreatTrack
ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Updated 10 months ago
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below
Sorting:
- eml metadata parser.☆17Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated 2 weeks ago
- Colored Cat is a syntax highlighter file reader.☆16Updated 10 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Automatic cloud backup of Kali Linux data☆12Updated 5 years ago
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆18Updated 10 months ago
- A network logging tool that logs per process activities☆32Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- ☆16Updated 3 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- ☆24Updated 3 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆19Updated 3 years ago
- ☆44Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Updated 6 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆29Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆43Updated 8 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- ☆13Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 7 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Updated 11 months ago
- ☆64Updated last year
- ☆26Updated 2 years ago