OSINT automation for hackers.
☆23Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for bbot-1
Users that are interested in bbot-1 are comparing it to the libraries listed below
Sorting:
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Jul 3, 2023Updated 2 years ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- OSINT TOOLS☆35Nov 29, 2023Updated 2 years ago
- ☆26Dec 15, 2023Updated 2 years ago
- Bluetooth speaker killer☆34Jun 1, 2024Updated last year
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- ☆37Jan 1, 2023Updated 3 years ago
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 3 months ago
- ERC-7824 Nitro reference implementation☆15Mar 11, 2025Updated 11 months ago
- ☆13Jun 29, 2023Updated 2 years ago
- ☆10Jul 5, 2023Updated 2 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆13Jan 13, 2024Updated 2 years ago
- ☆13Jul 29, 2024Updated last year
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- nyeri☆15Feb 25, 2021Updated 5 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆43Jun 30, 2024Updated last year
- Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。☆11Nov 28, 2022Updated 3 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- Control your device like battery level info,Tower location,Alarm,Device lock and Wiping using SMS. Another open source android app from M…☆12Jun 20, 2022Updated 3 years ago
- Crypto market data aggregator for order books, trades, liquidations, and open interest by depth levels. Experimental toy project — unsuit…☆13Jan 16, 2026Updated last month
- Fake Windows Update Prank☆13May 3, 2017Updated 8 years ago
- Cracking hashes using AWS GPU instances☆10Sep 4, 2017Updated 8 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Lab generation for final project in EC521. Used to teach students how to use some popular and powerful OSINT tools such as Maltego, h8mai…☆14Dec 14, 2019Updated 6 years ago
- Markov chain-based word generator based on Sam Twidale's implementation in Haxe.☆10Aug 28, 2025Updated 6 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago