Integrated web scraper and email account data breach comparison tool
☆77Jul 22, 2024Updated last year
Alternatives and similar repositories for hookshot
Users that are interested in hookshot are comparing it to the libraries listed below
Sorting:
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆33Feb 8, 2026Updated 3 weeks ago
- A simple Linux TCP client-server proxy able to redirect all data from one address to another by preserving source IP address.☆17Aug 23, 2017Updated 8 years ago
- Facebook OSINT Collection and Analysis Tool☆54Jan 6, 2020Updated 6 years ago
- ☆44Sep 21, 2021Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- ☆10Nov 23, 2020Updated 5 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Tools for WD My Cloud Home☆11Jun 21, 2020Updated 5 years ago
- Professional RAG development skills for Claude Code - audit, evaluate, optimize, and scaffold RAG pipelines☆25Jan 18, 2026Updated last month
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- Deploy Pytorch models to production via panini☆10Mar 18, 2019Updated 6 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- ☆13Sep 20, 2021Updated 4 years ago
- ☆12Mar 27, 2024Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Powershell script to get all user devices registered in SCCM.☆15Jul 23, 2021Updated 4 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Demonstration of how to upload birthday video messages to President Trump, as requested by his supporters, using the command line.☆11Jun 5, 2020Updated 5 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- IPFS☆16Apr 4, 2018Updated 7 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 6 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- Using plotly to perfom data visualization of ransomware leak site data☆14Feb 15, 2024Updated 2 years ago