Finds sensitive stuff in your git repository by specifying terms to look for
☆31Feb 16, 2018Updated 8 years ago
Alternatives and similar repositories for pepito
Users that are interested in pepito are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Stop searching for sample hashes on 10 different sites.☆66May 31, 2018Updated 7 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Monitor traffic for unencrypted data and display a dashboard.☆15Aug 31, 2017Updated 8 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆163Nov 21, 2019Updated 6 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- A simple way for detection the remote user's antivirus☆84Oct 24, 2016Updated 9 years ago
- Get your USB Rubber Ducky up and running faster☆46Nov 18, 2017Updated 8 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Search for categorized domain☆456Jan 15, 2019Updated 7 years ago
- Basic demo for Hidden Treasure talk.☆49Nov 4, 2017Updated 8 years ago
- A Wall of Sheep for a WiFi Pineapple, a customized version of DWall☆10Dec 12, 2016Updated 9 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- ☆11Mar 30, 2017Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- Smb Scanner from PingCastle☆125Apr 9, 2019Updated 6 years ago
- Web interface for recon-ng☆14Nov 22, 2015Updated 10 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago