gabamnml / hoperLinks
Security tool to trace URL's jumps across the rel links to obtain the last URL
☆52Updated 2 years ago
Alternatives and similar repositories for hoper
Users that are interested in hoper are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆41Updated 12 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Easy Window domain access☆51Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Centralized Firewall Control☆21Updated 7 years ago
- ☆63Updated 9 years ago
- ☆25Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago