The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or private keys. Thereby, SFH is able to enumerate FTP, NFS, or SMB services as well as local filesystems.
☆14Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for SmartFileHunter
Users that are interested in SmartFileHunter are comparing it to the libraries listed below
Sorting:
- BugBuntu Linux☆15May 21, 2021Updated 4 years ago
- OSINT Brazuca Posters é um repositório criado com intuito de organizar posters autorais dentro do projeto OSINT Brazuca.☆14Dec 13, 2023Updated 2 years ago
- Quarkus Mutual TLS Quickstart☆12Mar 28, 2025Updated 11 months ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- sigstore helm-charts and build scripts opinionated for running on OCP and RHEL☆12Mar 3, 2025Updated last year
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- Read data from ascii tables☆11May 4, 2018Updated 7 years ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- SVG Images with XSS in them☆17Oct 5, 2023Updated 2 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- Satellite 4 Noobs - Powered by He4rt Devs☆30Mar 19, 2024Updated 2 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Logfiles from testing with real cars☆16Nov 26, 2025Updated 3 months ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Two codes to lock iPhone and Android devices using WhatsApp☆12Aug 29, 2022Updated 3 years ago
- cuz life is scriptable...☆26Feb 27, 2026Updated 3 weeks ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- A starter project to create Arc jobs using the Jupyter Notebook interface☆22Mar 25, 2021Updated 4 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Shared library loading application for Linux written in Go.☆16Aug 31, 2020Updated 5 years ago
- HTML encrypter protect web pages source code, its hard for people to decrypt the source code but it displays perfectly in a browser. No A…☆15May 11, 2019Updated 6 years ago
- Simple JS script that overloads the browser with a huge URL☆13May 27, 2020Updated 5 years ago
- Republic of Korea (South Korea) specific OSINT source list☆16Mar 2, 2022Updated 4 years ago
- ☆18Jun 4, 2020Updated 5 years ago
- Demonstrate how OpenShift and other tools can be leveraged to automate performance tests☆24Nov 23, 2023Updated 2 years ago
- 服务器杀手☆12May 10, 2020Updated 5 years ago
- Hide files and data in plain ascii text that is invisible to the naked eye☆18Feb 10, 2015Updated 11 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated 11 months ago
- Telegram Remote Administration Tool☆25Sep 24, 2024Updated last year
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- A simple python script to punish credit card scammers.☆14Apr 10, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago