adoreste / truehunter
Truehunter
☆31Updated 3 years ago
Alternatives and similar repositories for truehunter:
Users that are interested in truehunter are comparing it to the libraries listed below
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- ☆15Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Javascript deobfuscation tool☆17Updated 6 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A very simple Python script to take screenshots of websites☆17Updated 7 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago