Sq00ky / LeetLinkedView external linksLinks
A Google/Bing Scraping tool for LinkedIn
☆93Jul 1, 2023Updated 2 years ago
Alternatives and similar repositories for LeetLinked
Users that are interested in LeetLinked are comparing it to the libraries listed below
Sorting:
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 3 years ago
- PoSh BloodHound Dog Whisperer☆193May 23, 2023Updated 2 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 3 months ago
- ☆98Apr 15, 2022Updated 3 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- ☆30Nov 25, 2025Updated 2 months ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆10May 22, 2022Updated 3 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 5 months ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 2 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,468Nov 26, 2024Updated last year
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Convert OVA and other file types to be able to use and create a Proxmox VM☆33Jun 28, 2022Updated 3 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Feb 1, 2022Updated 4 years ago
- A care package of useful bofs for red team engagments☆55Dec 6, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆273Jan 27, 2021Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago