DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
☆41Apr 9, 2022Updated 4 years ago
Alternatives and similar repositories for DDWPasteRecon
Users that are interested in DDWPasteRecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A set of tools, procedures, and playbooks for performing bug bounties☆18Dec 2, 2018Updated 7 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 8 months ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆20Jul 14, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- Funny Fuzzing Wordlist☆14Jun 14, 2022Updated 3 years ago
- APK black-box obfuscator for my Master's project☆14May 2, 2021Updated 4 years ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆13Jan 25, 2026Updated 2 months ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- C/C++ Based SDR Library with dsp blocks☆16Aug 15, 2024Updated last year
- Site fast fuzzing with chorme extension.☆24Feb 4, 2022Updated 4 years ago
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PathCoin (transfer bitcoin without network interaction) - proof of concept demonstration☆10Nov 19, 2023Updated 2 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆17Jun 7, 2024Updated last year
- ☆11Mar 19, 2020Updated 6 years ago
- Automatic Web Vulnerability Scanner.☆47Mar 30, 2022Updated 4 years ago
- A email OSINT tool written in python3☆20Nov 26, 2022Updated 3 years ago
- The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DS…☆20Dec 13, 2023Updated 2 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Evildork targeting your fiancee👁️☆94Jul 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆49Jul 31, 2023Updated 2 years ago
- Find any website vulnerability and bugs in few second.☆37Oct 1, 2020Updated 5 years ago
- 一个验证对CVE-2024-21733☆26Aug 16, 2024Updated last year
- Red Tools 渗透测试☆15May 30, 2022Updated 3 years ago
- Opensource Telegram (Osint) Tool☆20Jan 3, 2025Updated last year
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- Detect and Extract Table On Image (OpenCV)☆18Aug 3, 2020Updated 5 years ago