TheCyberpunker / houseHoleLinks
Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.
☆33Updated last year
Alternatives and similar repositories for houseHole
Users that are interested in houseHole are comparing it to the libraries listed below
Sorting:
- A comprehensive automation script for penetration testing and reconnaissance.☆42Updated last year
- ☆55Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- wp-config-scan☆80Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Updated 8 months ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Script en bash de Nmap que se puede personalizar para ajustar el escaneo a tus necesidades.☆11Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- Discovering Typo Squatting on your domains!☆72Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆27Updated 4 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆30Updated 10 months ago
- 🕵️ Email osint tool☆62Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 4 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆127Updated last year
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆48Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆90Updated 4 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated 11 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- NetProbe: Network Probe☆164Updated 11 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆156Updated 6 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆46Updated 3 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆216Updated 8 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆54Updated 9 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 9 months ago