Zeyad-Azima / Need-IPLinks
A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more
☆11Updated 2 years ago
Alternatives and similar repositories for Need-IP
Users that are interested in Need-IP are comparing it to the libraries listed below
Sorting:
- Spider or repeater to find all links.☆11Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- ☆33Updated 8 months ago
- A semi-automatic osint/recon framework.☆25Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- CVE-2021-40444 Sample☆12Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- ☆22Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Updated last year
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆33Updated 4 years ago
- PhishGen is a penetration testing and red teaming tool that automates the process of generating email addresses using names scraped from …☆42Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆30Updated 4 years ago
- Transform your batch (bat) script into one binary.exe☆50Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago