Ls4ss / ThreatTrackLinks
ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Updated last year
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below
Sorting:
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆25Updated 3 months ago
- ☆65Updated 2 years ago
- Fuxsociety Mr Robot 2.1☆27Updated 2 years ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated 2 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated 11 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆25Updated 3 years ago
- ☆16Updated 6 months ago
- eml metadata parser.☆17Updated 2 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Enumeração de Usuário☆52Updated this week
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆76Updated 2 years ago
- ☆55Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Automatic cloud backup of Kali Linux data☆12Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆20Updated 2 months ago
- Colored Cat is a syntax highlighter file reader.☆16Updated last year
- ☆24Updated 6 months ago
- ☆56Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 9 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year