ecstatic-nobel / Aisle25View external linksLinks
Detect leaks in security event logs.
☆20Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- Threat hunting tool for scraping latest scrapes from Pastebin☆35Feb 17, 2021Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- hacking tool menu!☆26Aug 4, 2021Updated 4 years ago
- C++ Firefox & Google Chrome Cracker Source Code☆37Aug 6, 2017Updated 8 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Apr 9, 2022Updated 3 years ago
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- Premium React Native App Template with Argon Design☆10Sep 17, 2024Updated last year
- An API that provides an interface to search complaint data.☆17Feb 3, 2026Updated last week
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Keep It Secure Private Data Encryption & Decryption Tool☆45Mar 11, 2018Updated 7 years ago
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- Connection utility for handling Websocket and SSE streaming with LLM providers to your Sveltekit app.☆13Jan 16, 2026Updated 3 weeks ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- PowerBI Custom Visual that performs NLP for the data on your dashboard. (NLP Powerd by OpenAI GPT API)☆11May 25, 2023Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆12Apr 4, 2024Updated last year
- ☆12Jul 15, 2018Updated 7 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Contains various Greek and Roman works of antiquity that were originally provided as part of the Perseus project (http://www.perseus.tuft…☆14Sep 27, 2013Updated 12 years ago
- Front end (UI) plugin to support security-analytics☆16Updated this week
- ☆11Oct 20, 2018Updated 7 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- ☆13Feb 27, 2025Updated 11 months ago
- ☆10Jan 25, 2023Updated 3 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 10 years ago