horizon3ai / h3-cliLinks
CLI tool for the Horizon3.ai API
☆22Updated last week
Alternatives and similar repositories for h3-cli
Users that are interested in h3-cli are comparing it to the libraries listed below
Sorting:
- ☆57Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated last month
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Updated 3 months ago
- Most common AWS S3 bucket names.☆28Updated 5 years ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Updated last year
- A Red Teaming tool focused on profiling the target.☆29Updated last month
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆76Updated 10 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆22Updated 8 months ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Tool for scanning domains for .git directories.☆17Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Updated last month
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- ☆19Updated 2 years ago
- ☆90Updated 2 years ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Updated last year
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Updated last month
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- This is an AD pentest tools collection☆59Updated last year
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆186Updated this week