OdinF13 / Monitor-pastebin-leaksLinks
Script to monitor pastebin.com's public pastes for sensitive data leakage
☆31Updated 5 years ago
Alternatives and similar repositories for Monitor-pastebin-leaks
Users that are interested in Monitor-pastebin-leaks are comparing it to the libraries listed below
Sorting:
- ☆72Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 11 months ago
- Dorks for Google, Shodan and BinaryEdge☆142Updated 5 years ago
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆57Updated 3 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Advance Google Dorker and Vulnerability Scanner☆49Updated 7 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- Fraud prevention tool☆28Updated 5 years ago
- Evildork targeting your fiancee👁️☆92Updated 2 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆72Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆34Updated 4 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- A small and fast bash script to automate LFI vulnerability.☆11Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆99Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- OSINT tool for discovering confidential data leaked on Github.☆51Updated 2 years ago
- Complete Automated pentest framework for Information Gathering☆43Updated 6 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 4 months ago
- Full Valid Fake Data Generator☆101Updated last year
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 3 years ago
- [ Automated Web Vulnerability Scanner ]☆71Updated 5 years ago