initd1 / HackAlert
Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona, including financial, social, and personal accounts, to detect data breaches or hacks. With real-time notifications via text or email, you can take action before it's too late. Stay safe and secure with HackAl…
☆17Updated 6 months ago
Alternatives and similar repositories for HackAlert:
Users that are interested in HackAlert are comparing it to the libraries listed below
- Challenge Python☆19Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 2 months ago
- ThreatTracer - A python Script to identify CVE by name & version by @FR13ND0x7F☆110Updated 7 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated 3 months ago
- ☆26Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 2 months ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- Check out this JavaScript code that extracts URLs from a web page and linked scripts! Perfect for web scraping and penetration testing☆18Updated 9 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- ☆18Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- ☆24Updated last year
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated 6 months ago
- Discovering Typo Squatting on your domains!☆68Updated 8 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- This repository contains the best fuzzing wordlist files☆29Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆24Updated 2 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year