Passive Spider uses search engines to find interesting information about a target domain.
☆13May 29, 2018Updated 7 years ago
Alternatives and similar repositories for passive-spider
Users that are interested in passive-spider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 8 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆12Apr 20, 2023Updated 3 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Dec 8, 2014Updated 11 years ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- ☆54Jan 22, 2025Updated last year
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆12May 10, 2019Updated 7 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Mar 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Description here☆12Aug 17, 2022Updated 3 years ago
- Exploits for different vulnerabilities☆12Nov 29, 2021Updated 4 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- access zap proxy api using ruby☆12Mar 2, 2018Updated 8 years ago
- Roadmap to become a Linux-Fine☆10Jul 13, 2024Updated last year
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆11Aug 1, 2021Updated 4 years ago
- PetitPotam fork with Kerberos support in the impacket script☆17Aug 3, 2021Updated 4 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13Dec 29, 2020Updated 5 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆13Feb 1, 2022Updated 4 years ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- A Ruby library that adds or redefines several methods for the Process module☆24Apr 17, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago