gabamnml / hoper
Security tool to trace URL's jumps across the rel links to obtain the last URL
☆53Updated 2 years ago
Alternatives and similar repositories for hoper:
Users that are interested in hoper are comparing it to the libraries listed below
- Simple reverse ICMP shell☆41Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- A collection of useful scripts for penetration testers☆82Updated 12 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Metasploit Framework☆26Updated 7 years ago
- Automated Security Assessment Reporting Tool☆39Updated 7 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- ☆63Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- ☆25Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆33Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago