Threat hunting tool for scraping latest scrapes from Pastebin
☆36Feb 17, 2021Updated 5 years ago
Alternatives and similar repositories for PastebinScrapy
Users that are interested in PastebinScrapy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 8 months ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 7 years ago
- Slides for my conference talks☆45Aug 11, 2023Updated 2 years ago
- dnsoverhttps - D'oh!☆14Sep 20, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Sep 21, 2020Updated 5 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Auditor app prebuilt using the latest official release of the Auditor app.☆11Apr 21, 2026Updated 2 weeks ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- PdfViewer app prebuilt using the latest official release of the PdfViewer app.☆13Apr 21, 2026Updated 2 weeks ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Base and recommended kernel configurations. The base configurations are enforced by the VTS and are modified to permit GrapheneOS changes…☆17Dec 4, 2025Updated 5 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Apr 25, 2022Updated 4 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- The UI Automation COM-to-.NET Adapter makes it possible to use the new Windows Automation API 3.0 COM interfaces, with their improved rel…☆12Jan 3, 2019Updated 7 years ago
- ☆26Mar 24, 2026Updated last month
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- TWINT Flask-Celery Server. Optimized tweets scraping☆12Jun 2, 2019Updated 6 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Data Structures and Algorithms preparation for technical interview. Hence I am a php person, I had to recreate these classes using PHP to…☆14Jul 2, 2015Updated 10 years ago
- ☆543Mar 15, 2026Updated last month
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- A very basic introduction to reverse engineering (in general and for Android) as well as some useful tools (apktool, dex2jar, jd-cmd) pac…☆12Jul 21, 2020Updated 5 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 8 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- Python API wrapper for DarkSearch (darksearch.io).☆36Mar 15, 2022Updated 4 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- ☆25May 13, 2019Updated 6 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆27Jun 18, 2024Updated last year
- Useful scripts and notes for system administration and engineering☆14Jul 21, 2025Updated 9 months ago