eversinc33 / deepsea
Deepsearch leak database client, as an alternative for pwndb
☆15Updated 2 years ago
Alternatives and similar repositories for deepsea:
Users that are interested in deepsea are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated last month
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- ☆69Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- ☆15Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 2 months ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago