adoreste / truehunter
Truehunter
☆31Updated 3 years ago
Alternatives and similar repositories for truehunter:
Users that are interested in truehunter are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆50Updated 3 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- ☆11Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ☆11Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆15Updated 8 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago