PW3Query is a serverless query agent and repository for PublicWWW with a focus on proactively generating threat intelligence related to web compromises.
☆20Jul 25, 2019Updated 6 years ago
Alternatives and similar repositories for PW3Query
Users that are interested in PW3Query are comparing it to the libraries listed below
Sorting:
- ☆38Aug 22, 2018Updated 7 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- Private api to get session cookie of google account, login by email, password and some recovery option☆14Jan 8, 2019Updated 7 years ago
- اداه اختراق وايفاي wifi-hacker 《 جميع الحقوق محفوظة 》 تحتاج روت 《 محمد مهدي من سوريا 》 m313s@ Wifi paswoord wps/2 نبدأ بنسخ الاوامر ولصق…☆15Jan 29, 2021Updated 5 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated last year
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- ☆19Mar 6, 2012Updated 14 years ago
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 11 months ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- A high-performance proxy validator and monitoring tool that automatically collects, validates, and manages proxy lists from multiple sour…☆16Jan 7, 2025Updated last year
- Code Repository for Fundamentals of Unix and Linux System Administration, published by Packt☆12Jan 18, 2021Updated 5 years ago
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- C# client for SonarQube 8.x☆11Apr 6, 2023Updated 2 years ago
- Various Chaos Toolkit experiments for Kubernetes☆11Dec 10, 2020Updated 5 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Scriptset to enumerate PCIe Device to NUMA mapping within an VMware ESXi Host☆11Jan 10, 2020Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Chrome Extensions Dataset☆10Updated this week
- Scans a given directory tree for interesting assembly references☆17Feb 24, 2026Updated last week
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Provides an advanced search for browser bookmarks and histories.☆11May 17, 2025Updated 9 months ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆29Nov 18, 2025Updated 3 months ago
- Implementation of kexstat via /dev/kmem with kernel ASLR support☆36Dec 5, 2015Updated 10 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Basic collection of data mining algorithms implemented in Go☆10Jul 12, 2014Updated 11 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- Learn to develop mobile applications from zero to deployment with these in-depth guides and sample application☆10Dec 7, 2022Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- edBB is a platform for student monitoring in remote education consisting of a collection of sensors and software that capture biometric a…☆11May 13, 2025Updated 9 months ago