Detect leaks in security event logs.
β20Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- ποΈπ§ Find exposed and unsecured databases from a list of hosts. ποΈπ§β15Jul 1, 2021Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.β22Jan 10, 2022Updated 4 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single runβ19May 23, 2022Updated 3 years ago
- Password and email checker. It is your password or email compromissed? Check it now!β11Dec 8, 2022Updated 3 years ago
- Tools to automate AWS Cloud security assessmentsβ24Mar 26, 2020Updated 5 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.β75Oct 30, 2021Updated 4 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.β13Nov 29, 2025Updated 3 months ago
- C++ Firefox & Google Chrome Cracker Source Codeβ37Aug 6, 2017Updated 8 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.β14Mar 10, 2023Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHuntβ¦β15Dec 18, 2021Updated 4 years ago
- Black Hat Tools write in pythonβ11Feb 23, 2023Updated 3 years ago
- A tool to scan for .DS_Store files on webserversβ35Mar 28, 2021Updated 4 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many moreβ13Dec 20, 2022Updated 3 years ago
- Premium React Native App Template with Argon Designβ10Sep 17, 2024Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEβ¦β11May 19, 2020Updated 5 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessmentβ11Jul 18, 2021Updated 4 years ago
- An API that provides an interface to search complaint data.β17Feb 3, 2026Updated last month
- PoC Listβ10Sep 4, 2022Updated 3 years ago
- Find your router's default passwordβ14Apr 7, 2015Updated 10 years ago
- SSH brute-forcing tool written in pythonβ14Feb 10, 2023Updated 3 years ago
- This repository is based on the book "Black Hat Python" contains code and resources related to the tools and scripts discussed in the booβ¦β14May 6, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentesβ¦β11May 26, 2023Updated 2 years ago
- Library of threat hunts to get any user started!β50Sep 4, 2020Updated 5 years ago
- Automatically enumerate and fingerprint SD-WAN nodes on the internetβ49Jul 21, 2021Updated 4 years ago
- Scripts to get the most out of Tenable.ioβ12Feb 10, 2021Updated 5 years ago
- β12Jul 15, 2018Updated 7 years ago
- PowerBI Custom Visual that performs NLP for the data on your dashboard. (NLP Powerd by OpenAI GPT API)β11May 25, 2023Updated 2 years ago
- aws ssm public documentsβ12Feb 22, 2026Updated last week
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.β17Jan 5, 2026Updated 2 months ago
- SMBMap is a handy SMB enumeration toolβ38Jun 18, 2024Updated last year
- Front end (UI) plugin to support security-analyticsβ16Updated this week
- Cobalt Strike automation scripts collectionβ12Oct 28, 2020Updated 5 years ago
- Steganography Reverse Shellβ10Apr 22, 2023Updated 2 years ago
- Connection utility for handling Websocket and SSE streaming with LLM providers to your Sveltekit app.β13Updated this week
- β14Feb 27, 2025Updated last year
- Get latest Exploit Databases notification on your Desktopβ16Jan 29, 2020Updated 6 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.β19Aug 29, 2021Updated 4 years ago
- π¦π¬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.β11Jan 9, 2020Updated 6 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithmsβ10Sep 12, 2024Updated last year