Ls4ss / ThreatTrackLinks
ThreatTrack | Shodan + ExploitDB + GitHub + NVD
☆17Updated 10 months ago
Alternatives and similar repositories for ThreatTrack
Users that are interested in ThreatTrack are comparing it to the libraries listed below
Sorting:
- eml metadata parser.☆17Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated last month
- Colored Cat is a syntax highlighter file reader.☆16Updated 11 months ago
- A network logging tool that logs per process activities☆32Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Updated 7 months ago
- ☆16Updated 4 months ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 3 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated 3 weeks ago
- ☆13Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 8 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆64Updated 2 years ago
- ☆19Updated 3 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 9 months ago
- Fuxsociety Mr Robot 2.1☆27Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆49Updated 3 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- XML-RPC Vulnerability Checker and Directory Fuzzer☆24Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆12Updated 9 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- ☆26Updated 2 years ago