aitjcize / creepyLinks
Dead simple web crawler for Python
☆39Updated 5 years ago
Alternatives and similar repositories for creepy
Users that are interested in creepy are comparing it to the libraries listed below
Sorting:
- Spiders a website using the darknet via Tor☆12Updated 8 years ago
- Scrape the deep web for live urls☆13Updated 9 years ago
- Scapy docs, examples, scripts and other stuff☆40Updated 10 years ago
- Scrape google search results☆93Updated 7 years ago
- Get detailed information about a Twitter user activity☆101Updated 10 years ago
- A facebook profile and reconnaissance system☆57Updated 11 years ago
- ☆63Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 7 years ago
- A Simple network sniffer implemented on Python 3☆75Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Collects WHOIS details for every IPv4 netblock. Reports supported via Elasticsearch.☆103Updated 7 years ago
- Viewers for statistics and dashboarding of Domain Search Engine data☆125Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- Extract useful information from a Twitter account.☆35Updated 11 years ago
- Example scripts for common python tasks☆57Updated 13 years ago
- Hidemyass Proxy Grabber☆88Updated 8 years ago
- HTTP Tester, SMTP Server, DNS grinder, socket scanner, packet sniffer, HTTP, Proxy Cache, port conversion scripts with select, sockets an…☆71Updated 12 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆72Updated 11 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆99Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 10 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Updated 13 years ago
- Python distributed web scrapper and dynamic crawler☆148Updated 8 years ago