hIMEI29A / gichidan
Gichidan - CLI wrapper for Ichidan deep-web search engine.
☆29Updated 6 years ago
Related projects: ⓘ
- ☆19Updated this week
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- A collection of scripts made duing my personal research☆28Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆43Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 3 years ago
- ☆21Updated this week
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- Enumerate subdomains through Virustotal☆32Updated 4 years ago
- ☆35Updated this week
- Search Nmap and Metasploit scanning scripts.☆53Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 5 years ago
- Admin Panel Finder☆35Updated 9 months ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 8 years ago
- pentest toolbox☆28Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 2 years ago
- Create lists from nmap output.☆13Updated 3 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆54Updated 6 years ago
- ☆24Updated this week
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 6 years ago