gabamnml / hoperLinks
Security tool to trace URL's jumps across the rel links to obtain the last URL
β52Updated 3 years ago
Alternatives and similar repositories for hoper
Users that are interested in hoper are comparing it to the libraries listed below
Sorting:
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 9 years ago
- analyze a web-based network traffic πΆ to detect central command and control serversβ79Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.β42Updated 9 years ago
- A collection of useful scripts for penetration testersβ83Updated 13 years ago
- Simple IP Information Tools for Reputation Data Analysisβ23Updated 7 years ago
- Terminal Ip Lookup Toolβ56Updated 11 years ago
- Simple website to display the LAN status based on a nmap scanβ58Updated 3 years ago
- The Unofficial Burp Extension for DNSDumpster.comβ70Updated 7 years ago
- Automated Security Assessment Reporting Toolβ37Updated 8 years ago
- Intelligent threat hunter and phishing serversβ47Updated 6 years ago
- Offline Digital Forensics Tool for Binary Filesβ38Updated 8 years ago
- Check if a IP is from tor or is a malicious proxyβ57Updated 4 years ago
- Honeypot (Dionaea and kippo) setup scriptβ83Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.β72Updated 6 years ago
- Simple reverse ICMP shellβ41Updated 12 years ago
- Opens 1K+ IPs or Shodan search results and attempts to loginβ148Updated 4 years ago
- Search exploits in multiple exploit databases!β86Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.β43Updated 11 years ago
- Automate ARP poisoning, ssltrip, and ettercap.β48Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwordsβ46Updated 8 years ago
- DNS Enumeration and Reconnaissance Toolβ36Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devicesβ66Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes resβ¦β44Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.β20Updated 8 years ago
- tools for analyzing strings from password listsβ58Updated 3 years ago
- β61Updated 7 years ago
- Collection of tools for web recon and enumeration.β56Updated 10 years ago
- Finds sensitive stuff in your git repository by specifying terms to look forβ31Updated 7 years ago
- Rogue AP killerβ91Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweetβ43Updated 9 years ago