gabamnml / hoper
Security tool to trace URL's jumps across the rel links to obtain the last URL
☆48Updated last year
Related projects ⓘ
Alternatives and complementary repositories for hoper
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 5 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- Metasploit Framework☆26Updated 7 years ago
- Some simple and useful tools☆15Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆38Updated 7 years ago
- ☆25Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆59Updated 4 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆42Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago