PlaytikaOSS / LeaktopusLinks
☆30Updated 10 months ago
Alternatives and similar repositories for Leaktopus
Users that are interested in Leaktopus are comparing it to the libraries listed below
Sorting:
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- Manage attack surface data on Elasticsearch☆22Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated last year
- ☆28Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆30Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆15Updated 3 years ago
- ☆22Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 3 weeks ago
- FireProx written in Go☆19Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Easy discovery of assets☆13Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 10 months ago
- ☆18Updated 7 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Active Directory Password Spray Testing Utility in Go☆17Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- A selection of rebuilt and from scratch exploits, scripts and ideas that can be used in red-teaming scenarios.☆5Updated last year
- ☆18Updated 6 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago