evilsocket / altairLinks
A Modular Web Vulnerability Scanner
☆51Updated 14 years ago
Alternatives and similar repositories for altair
Users that are interested in altair are comparing it to the libraries listed below
Sorting:
- Package manager for hackers built by hackers☆36Updated 6 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Gathering Email Information Tool☆37Updated 8 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Vault 7: CIA Hacking Tools Revealed☆16Updated 8 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- ☆19Updated 8 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Python tool for Dorking☆11Updated 2 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 10 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 3 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- ~ ADMIN Panel Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆21Updated 9 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- ☆13Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago