Scans Onion sites for keywords and if found, will send an email alert to designated email address. Ideal for individuals or companies who want to monitor the dark web for any data leaks etc...
☆34Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for dark-web-scanner
Users that are interested in dark-web-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to monitor pastebin.com's public pastes for sensitive data leakage☆31Dec 2, 2020Updated 5 years ago
- Dark Web OSINT With Python and OnionScan☆44Feb 27, 2017Updated 9 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Sep 2, 2022Updated 3 years ago
- A dark web link and image scraper☆16Sep 14, 2023Updated 2 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- Dark Web Crawler for crawling the hidden onion sites and indexing them in Solr☆62Oct 16, 2017Updated 8 years ago
- https://sites.google.com/securifyinc.com/secblogs/finding-leaked-sensitive-data☆17Jun 14, 2018Updated 7 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- Transfer.sh command line program, Now file sharing from the command line is easy.☆13Feb 28, 2023Updated 3 years ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as …☆16Updated this week
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆20Jun 28, 2022Updated 3 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- HACK ATM MACHINES NEAREST TO YOU AND BECOME RICH!!! You can hack and break into a bank’s security ATM Machine without carrying guns or an…☆19Sep 14, 2016Updated 9 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Powershell script to generate DMARC reports. Script pulls data from the mailbox and parses this into a onpremises GEO enabled HTML report…☆26Feb 7, 2022Updated 4 years ago
- Make online accounts hackproof by using encrypted passwords.☆12Oct 9, 2021Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Jul 9, 2012Updated 13 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆50Jul 25, 2023Updated 2 years ago
- Password cracking software written in python using Tkinter. Supports rar and zip files.☆15Mar 20, 2021Updated 5 years ago
- Scripts and analysis in support of statistical analysis of WL Afghanistan data☆72Mar 9, 2011Updated 15 years ago
- Blog☆10Jul 18, 2023Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- Ansible galaxy role for Duo☆14Nov 30, 2015Updated 10 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- hi guys you can use this tool to crack anyones instagram password . if you need to use this tool just got to have some basic hacking know…☆16Mar 18, 2020Updated 6 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- GForce is a bruteforce programm. GForce can hack a gmail account with a big list of passwords. Only for pentesting! :D☆11Jul 26, 2016Updated 9 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 5 months ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆17Sep 26, 2024Updated last year
- ☆12Dec 18, 2020Updated 5 years ago