A tool to scrape LinkedIn without API restrictions for data reconnaissance
☆22Feb 21, 2021Updated 5 years ago
Alternatives and similar repositories for ScrapedIn
Users that are interested in ScrapedIn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Ready-to-use n8n automation workflows for business, AI, and productivity. Instantly boost efficiency with 22 templates—no coding needed!☆32Aug 8, 2025Updated 7 months ago
- A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865☆22Mar 5, 2021Updated 5 years ago
- AI-Powered Web Attack Surface Enumeration☆34Feb 5, 2026Updated last month
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- ☆26Jul 12, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Next generation cyber security research and testing software.☆16Mar 18, 2021Updated 5 years ago
- Excel parser for various pentesting tools.☆31Jun 13, 2023Updated 2 years ago
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Sep 13, 2024Updated last year
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- 📨 AI Mailbox, powered by Dialogflow☆10Apr 18, 2020Updated 5 years ago
- ☆34May 11, 2021Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Proof of Concept (DOS) ANSi rendering in Godot Engine☆13Feb 6, 2019Updated 7 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- ☆56Jan 30, 2023Updated 3 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Nov 14, 2019Updated 6 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆47Sep 19, 2022Updated 3 years ago