ax-i-om / raptureLinks
No-nonsense data breach search interface
☆11Updated last year
Alternatives and similar repositories for rapture
Users that are interested in rapture are comparing it to the libraries listed below
Sorting:
- 🕵️ OSINT Tool (github tracker)☆162Updated last year
- Helping you delete your old accounts☆85Updated 2 years ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆54Updated last month
- Tool to parse Stealer Logs.☆20Updated 2 years ago
- This script allows you to search for an Instagram profile using user ID or retrieve a profile's ID by username. It utilizes the Instagram…☆77Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- Discord bot for the Shodan API - OSINT tool☆82Updated last year
- Minecraft OSINT tool☆55Updated 2 years ago
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆120Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆96Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆99Updated 8 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆34Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- BountyDrive is a comprehensive tool designed for penetration testers and cybersecurity researchers. It integrates various modules for per…☆19Updated last year
- IoT Camera Reconnaissance and Live Viewer☆168Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆73Updated last week
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Updated last year
- SOCMINT tool to find social media accounts.☆30Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆44Updated 9 months ago
- ☆140Updated last year
- Detecting leaked secrets, API keys, credentials, and sensitive files from public repositories in near real-time using the GitHub Events A…☆27Updated 7 months ago
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated last week
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 7 months ago