This tool live-monitors specified Telegram channels for messages that contain certain keywords and forwards them to a private channel.
☆38Oct 14, 2024Updated last year
Alternatives and similar repositories for streaming_overseer
Users that are interested in streaming_overseer are comparing it to the libraries listed below
Sorting:
- Check for the existence of an email on Google platforms☆18Mar 20, 2024Updated last year
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- Browser extension that I use daily to detect fake news; search images and collect data.☆11Nov 19, 2022Updated 3 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- ☆18Sep 24, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- ☆12Aug 10, 2022Updated 3 years ago
- Methodology for "The Disappearance of Quitobaquito Springs: Tracking Hydrologic Change with Google Earth Engine," published on October 1,…☆14Sep 24, 2020Updated 5 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- ☆45Mar 5, 2025Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- A tool for extracting additional data from a person's personal identifiers☆43Nov 14, 2023Updated 2 years ago
- Discovering Typo Squatting on your domains!☆80Jul 30, 2024Updated last year
- DorkEye | Automated Google Dorking Tool for OSINT & Recon. Generates and runs advanced search queries to surface exposed files, admin pan…☆76Updated this week
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- ☆20Nov 28, 2022Updated 3 years ago
- A command line tool to interact with Microsoft Graph API☆22May 27, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated last year