WebProgrammingII / WEPOLinks
Repository for all public code within the Web Programming II course
☆8Updated 7 years ago
Alternatives and similar repositories for WEPO
Users that are interested in WEPO are comparing it to the libraries listed below
Sorting:
- Florida Man 2017☆10Updated 7 years ago
- OSINT python webscaping framework☆1,099Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,059Updated 9 months ago
- Tweets metadata scraper & activity analyzer☆2,981Updated last year
- Setup script for Regon-ng☆933Updated 4 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆914Updated 8 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,264Updated last year
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,902Updated 4 months ago
- A Yaml to HTML slidedow pubquiz generator☆8Updated last year
- Search for leaked credentials☆1,341Updated 4 years ago
- Incredibly fast crawler designed for OSINT.☆11,702Updated 3 months ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.☆4,855Updated last year
- Build interactive map of cameras from Shodan☆1,262Updated 5 years ago
- Metadata harvester☆1,122Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,519Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,294Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,166Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,777Updated last year
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆636Updated 2 years ago
- Dirty COW☆3,399Updated 5 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆734Updated last year
- JackIt - Exploit Code for Mousejack☆853Updated 4 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,158Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,137Updated 5 years ago
- Collection of Scripts for shodan searching stuff.☆1,114Updated 2 weeks ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆4,038Updated 3 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆552Updated 8 years ago
- A python based LinkedIn enumeration tool☆563Updated 2 years ago
- ☆7Updated 7 years ago
- The Credential Mapper☆444Updated 7 years ago