DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
☆41Apr 9, 2022Updated 3 years ago
Alternatives and similar repositories for DDWPasteRecon
Users that are interested in DDWPasteRecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 8 months ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Open Web Researcher: is a cutting-edge, AI-powered alternative to tools like SearchGPT and Perplexity. It simplifies web research by refi…☆21Dec 30, 2024Updated last year
- ☆17Feb 4, 2020Updated 6 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆19May 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pasteb…☆14Mar 18, 2019Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- C/C++ Based SDR Library with dsp blocks☆16Aug 15, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- An Advanced Darkweb OSINT Tool☆24Jun 19, 2025Updated 9 months ago
- PathCoin (transfer bitcoin without network interaction) - proof of concept demonstration☆10Nov 19, 2023Updated 2 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- ☆11Mar 19, 2020Updated 6 years ago
- 📚 本仓库是冰河重现Log4j远程过程执行漏洞的代码示例,完整重现了Log4j最新远程过程执行漏洞,如果对你有所帮助,请给个大大的Star,谢谢啦!!☆11May 29, 2022Updated 3 years ago
- The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DS…☆19Dec 13, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- SMPP client library☆15Mar 17, 2026Updated last week
- ☆49Jul 31, 2023Updated 2 years ago
- Find any website vulnerability and bugs in few second.☆36Oct 1, 2020Updated 5 years ago
- 一个验证对CVE-2024-21733☆26Aug 16, 2024Updated last year
- Red Tools 渗透测试☆15May 30, 2022Updated 3 years ago