collinsmc23 / spy-pixelLinks
A spy pixel which can be emedded into web pages or emails.
☆97Updated 9 months ago
Alternatives and similar repositories for spy-pixel
Users that are interested in spy-pixel are comparing it to the libraries listed below
Sorting:
- To perform OSINT on an instagram profile☆75Updated 10 months ago
- GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).☆100Updated last year
- 🕵️ Email osint tool☆61Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆84Updated 10 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆92Updated 3 weeks ago
- Gather information about a Duolingo user☆76Updated last year
- NetProbe: Network Probe☆159Updated 7 months ago
- POC | Steal user WhatsApp information/data☆63Updated 3 weeks ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆45Updated 8 months ago
- IoT Camera Reconnaissance and Live Viewer☆146Updated 10 months ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆116Updated 2 years ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆80Updated 2 months ago
- Capture screenshots of onion services on an onion service.☆49Updated 11 months ago
- DPULSE - Tool for complex approach to domain OSINT☆124Updated this week
- Living Off The Land (LOTL) persistent Reverse shell☆100Updated last year
- Helping you delete your old accounts☆85Updated last year
- A tool for automatically change the Tor IP address over time.☆87Updated 2 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆39Updated 3 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 10 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 10 months ago
- Here are +200 different rats some with source code☆97Updated last year
- ☆64Updated 2 years ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆139Updated 2 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆176Updated 10 months ago
- What the name says....☆98Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 9 months ago
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆128Updated this week
- AI Powered Terminal Based Ethical Hacking Assistant☆67Updated 4 months ago