evilsocket / storkLinks
A small utility that aims to automate and simplify some tasks related to software release cycles.
☆43Updated 4 years ago
Alternatives and similar repositories for stork
Users that are interested in stork are comparing it to the libraries listed below
Sorting:
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- Import and display Masscan data☆35Updated last month
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- IoT device scanner.☆39Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Create automated tasks and keep an eye on interesting things!☆81Updated 3 months ago
- A fast http and https prober, to check which URLs are alive☆70Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 2 months ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- The Swiss Army knife for backend engineers.☆96Updated 4 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Multi-threaded socks proxy checker written in Go!☆44Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- GO sandbox to run untrusted code☆42Updated 5 years ago
- extracts urls from text☆16Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Simple golang shodan cli☆49Updated 4 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago