Information Gathering Tool
☆24Aug 16, 2013Updated 12 years ago
Alternatives and similar repositories for jigsaw
Users that are interested in jigsaw are comparing it to the libraries listed below
Sorting:
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆20Apr 5, 2023Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Browser extension that finds HTML comments.☆12Aug 8, 2024Updated last year
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Dec 8, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- ☆15May 6, 2023Updated 2 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- ☆16Apr 4, 2015Updated 10 years ago
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 8 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- A simple python library to interact with Microsoft Graph and Office 365 API☆18Dec 13, 2018Updated 7 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆22Sep 8, 2019Updated 6 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- Extension of sublister tool to check for subdomain takeovers☆23Mar 7, 2018Updated 7 years ago
- ☆75Aug 29, 2014Updated 11 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 6 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆14Jan 11, 2023Updated 3 years ago
- A listing of the most common vuln that you can link in your PoCs☆28Oct 27, 2018Updated 7 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆167Jul 10, 2014Updated 11 years ago
- ☆10Jun 24, 2020Updated 5 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆34Aug 21, 2024Updated last year
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Sparse Matrix Factorization (SMF) is a key component in many machine learning problems and there exist a verity a applications in real-w…☆11Jan 25, 2016Updated 10 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- ☆43Jun 4, 2014Updated 11 years ago