andrew-vii / hookshot
Integrated web scraper and email account data breach comparison tool
☆79Updated 9 months ago
Alternatives and similar repositories for hookshot
Users that are interested in hookshot are comparing it to the libraries listed below
Sorting:
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆145Updated 4 years ago
- Quick and dirty scripts for pentesting.☆41Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆138Updated 2 years ago
- ☆50Updated 2 years ago
- CLI tools using Harpoon features☆21Updated last year
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Facebook OSINT Collection and Analysis Tool☆52Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆67Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- automated password spraying tool☆148Updated 3 years ago
- Uncover the full name of a target on Linkedin.☆162Updated 2 years ago
- scylla.sh db dumps and more☆135Updated 4 years ago
- Slides for my conference talks☆43Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- Enumerate a target Based off of Nmap Results☆78Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 2 months ago
- A WLAN red team framework.☆153Updated 7 months ago
- ☆150Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago