asimtarapathak / Murari
Murari is a command-line tool built using Python that empowers cybersecurity professionals to enhance email security and conduct thorough email analysis.
☆9Updated last year
Alternatives and similar repositories for Murari:
Users that are interested in Murari are comparing it to the libraries listed below
- This repo contains the material pertaining to the Computer Programming course I teach at LAU☆52Updated last year
- Cheatsheets and clear roadmaps, empowering your learning journey with essential information at your fingertips.☆11Updated last year
- ☆17Updated 8 months ago
- ☆50Updated last year
- A cloud based tool for Social engineering attacks and Security audit☆32Updated 9 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago
- ☆29Updated 3 years ago
- Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on…☆11Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆49Updated last month
- Splunk add-on related to the PurpleLab tool☆39Updated last year
- ☆11Updated 8 months ago
- Your Guide to browse Onine sites☆90Updated 5 months ago
- Official Website of NOSK- Nepal Open Source Klub.☆12Updated 2 months ago
- Discovering Typo Squatting on your domains!☆68Updated 8 months ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated last year
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆222Updated 2 weeks ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆118Updated 3 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆92Updated this week
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆71Updated 2 months ago
- An advanced XSS vulnerability scanner.☆11Updated last month
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆189Updated 4 months ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆44Updated 7 months ago
- CLI tool to scan URLs for suspicious keywords, extensions, paths, and hidden files.☆44Updated 4 months ago
- Nessus Professional Latest☆26Updated last year
- Bug Bounty Resources from Scratch to start Hunting Bugs☆23Updated last month
- Bug Bounty ultimate tool☆19Updated 4 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆38Updated last month
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆172Updated 3 months ago
- World's first Artificial Intelligence (XSS) Cross Site Scripting powered by Machine Learning with extreme fine-tuning designed to detect …☆24Updated 8 months ago
- A lightweight and simple directory buster.☆16Updated last year