PlaytikaOSS / LeaktopusView external linksLinks
☆30Jul 28, 2024Updated last year
Alternatives and similar repositories for Leaktopus
Users that are interested in Leaktopus are comparing it to the libraries listed below
Sorting:
- ☆90Feb 11, 2022Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Reportly is an AzureAD user activity report tool.☆96Aug 14, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- A tool for folks who `git clone` first and ask questions later☆66Sep 12, 2025Updated 5 months ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- ☆160Nov 26, 2023Updated 2 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Jul 17, 2023Updated 2 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 7 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Nov 30, 2022Updated 3 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Jan 10, 2022Updated 4 years ago
- Get some useful data from Clouds for your targets☆20Feb 1, 2026Updated last week
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆79Jan 9, 2023Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 2 months ago
- ☆142Updated this week
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- WhiteBeam: Transparent endpoint security☆101Mar 29, 2023Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Feb 19, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- A WLAN red team framework.☆155Updated this week