andrew-vii / hookshotLinks
Integrated web scraper and email account data breach comparison tool
☆78Updated last year
Alternatives and similar repositories for hookshot
Users that are interested in hookshot are comparing it to the libraries listed below
Sorting:
- Create visualization from Shodan query☆75Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆141Updated 3 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆79Updated 3 weeks ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆148Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆54Updated 3 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆78Updated 2 years ago
- ☆35Updated 2 years ago
- Dehashed API CLI☆21Updated 5 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆78Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Shodan Port Scanner☆44Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆62Updated 10 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆67Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last month
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Updated 4 years ago