TheCyberpunker / houseHole
Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.
☆16Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for houseHole
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆26Updated 9 months ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆19Updated 9 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- ☆14Updated 11 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆39Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 11 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆15Updated 11 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆30Updated 10 months ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 9 months ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆19Updated last week
- DomainTrail is a fast subdomain enumeration tool that uses effective passive and active techniques.☆37Updated 7 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆30Updated 5 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆16Updated 5 months ago
- FireHawk: The Elite Firebase Security Testing Utility☆18Updated 6 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆29Updated 8 months ago
- ☆26Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated 11 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Updated 8 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆27Updated 4 months ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year