Passive Spider uses search engines to find interesting information about a target domain.
☆13May 29, 2018Updated 7 years ago
Alternatives and similar repositories for passive-spider
Users that are interested in passive-spider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 7 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- ☆54Jan 22, 2025Updated last year
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Roadmap to become a Linux-Fine☆10Jul 13, 2024Updated last year
- Shodan Port Scanner☆43Sep 30, 2020Updated 5 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- ☆13Jul 12, 2021Updated 4 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- A Ruby library that adds or redefines several methods for the Process module☆25Jan 29, 2026Updated last month
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last month
- ☆13Jul 14, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year