balestek / medor
medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.
☆10Updated 6 months ago
Alternatives and similar repositories for medor:
Users that are interested in medor are comparing it to the libraries listed below
- Terminal based fake identity generator.☆26Updated last year
- DataReaper is a powerful Python tool designed to harvest data from publicly accessible HTTP servers. It combines the capabilities of Shod…☆11Updated 10 months ago
- Fetch information about a public Google document.☆11Updated last year
- ☆17Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated last year
- ☆13Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Resolve Skype accounts by phone number with API interface☆14Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆38Updated 2 months ago
- Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve ca…☆15Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 2 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Bxss Sniper: A web application penetration testing tool for Blind XSS detection☆17Updated last year
- FOSS Instagram OSINT tool☆1Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Updated 10 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆25Updated 3 months ago
- Look up an email address or a name on Nike Run Club (NRC)☆12Updated 6 months ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated 3 weeks ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated last year
- ☆14Updated 2 years ago
- Another vulnerability scanner☆17Updated last year
- CORPINT - Corporate / Business Intelligence☆47Updated last month