Sanix-Darker / GENESISLinks
Generate multiple combinaisons of passwords from key names.
☆24Updated 5 years ago
Alternatives and similar repositories for GENESIS
Users that are interested in GENESIS are comparing it to the libraries listed below
Sorting:
- Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆40Updated 3 years ago
- Keylogger using pynput + mail sender☆54Updated 4 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆35Updated 4 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆68Updated 3 years ago
- A Phishing WIFI Rogue Captive Portal!☆42Updated 6 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate-limit!)☆24Updated 5 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- Python Script to help/automate the WiFi hacking exercises.☆86Updated 4 years ago
- Python script to perform phishing attacks through captive portals, made for learning purposes☆52Updated 2 years ago
- Send anonymous text messages with TOR and the TextBelt API☆67Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- A Tool using Shodan and RTSP to find vulnerable cameras around the world.☆59Updated 4 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆32Updated 4 years ago
- This is a simple tool for openbullet configs☆23Updated 3 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆12Updated 2 years ago
- This Script Will Detect Canary Token in Microsoft Word Documents☆54Updated 4 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …