A Python wrapper for the Hunter.io v2 API
☆133Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for PyHunter
Users that are interested in PyHunter are comparing it to the libraries listed below
Sorting:
- Tool to search possible emails indexed throught API's Hunter.io (https://hunter.io)☆31May 22, 2023Updated 2 years ago
- Stuff for OSCP☆14Jun 21, 2018Updated 7 years ago
- Crypto trading bot that monitors twitter feeds to take advantage of pump and dumps. Uses Twitter and Bittrex APIs☆17Dec 27, 2017Updated 8 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 8 months ago
- A repo to support the book☆112Aug 5, 2021Updated 4 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- ☆10Apr 6, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- ☆13Feb 29, 2020Updated 6 years ago
- collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such a…☆12Mar 29, 2016Updated 9 years ago
- Repository for Ludus french templates☆21Updated this week
- ☆30Jul 14, 2023Updated 2 years ago
- 🐺 Command-line application and golang client library for hunter.io☆39Aug 26, 2024Updated last year
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆13Dec 5, 2025Updated 2 months ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆14Oct 8, 2019Updated 6 years ago
- ☆18May 6, 2023Updated 2 years ago
- a brainfuck interpreter written in bash☆14Apr 22, 2016Updated 9 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader!☆31Oct 11, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago