Máquina virtual para investigaciones en fuentes abiertas OSINT
☆17Oct 4, 2024Updated last year
Alternatives and similar repositories for Camaleon
Users that are interested in Camaleon are comparing it to the libraries listed below
Sorting:
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Feb 19, 2026Updated 2 weeks ago
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- buldDNS: A DNS scanner for large-scale measurement☆22Jan 22, 2026Updated last month
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆20Jan 13, 2025Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A simple utility to generate domain names with all possible TLDs☆23Feb 3, 2023Updated 3 years ago
- SMB password sprayer☆20Jan 19, 2019Updated 7 years ago
- whois command implemented by golang with awesome whois servers list☆63Jun 1, 2023Updated 2 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- A Firefox Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon☆27Dec 9, 2024Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Jan 7, 2026Updated last month
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆43Aug 5, 2024Updated last year
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated last year
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆34Jul 18, 2025Updated 7 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- ☆11Feb 9, 2026Updated 3 weeks ago
- ☆13Apr 2, 2023Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- HackTheBox rich presence for Discord☆13May 30, 2024Updated last year
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- The fastest stacked-branch workflow for Git. Interactive TUI, smart PRs, safe undo. Written in Rust.☆58Updated this week
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- Kubernetes Master Class: A Seamless Approach to Rancher & Kubernetes Upgrades☆11May 30, 2022Updated 3 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- ☆10Jun 30, 2022Updated 3 years ago
- linux kernel overlay☆11Feb 28, 2026Updated last week
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago