Automated HaveIbeenPwned lookups using theharvester results
☆50Jan 9, 2018Updated 8 years ago
Alternatives and similar repositories for haveIbeenHarvested
Users that are interested in haveIbeenHarvested are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆30Jul 1, 2013Updated 12 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last month
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- ☆85Apr 17, 2020Updated 6 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 9 years ago
- A collection of useful scripts☆24Sep 12, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 9 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 9 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- macOS Class Tree☆21Oct 17, 2017Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- CVE-2017-13868: Information leak of uninitialized kernel heap data in XNU.☆27Dec 7, 2017Updated 8 years ago
- A parser/timeline creator for auditd logs.☆16Aug 5, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 8 months ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare☆296Feb 7, 2019Updated 7 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- ☆56May 30, 2017Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆51Jun 27, 2016Updated 9 years ago