james-see / awesome-pastes
list of all the pastebins across all protocols (Tor, ZeroNet, etc.)
☆41Updated 5 years ago
Alternatives and similar repositories for awesome-pastes:
Users that are interested in awesome-pastes are comparing it to the libraries listed below
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- CLI tools using Harpoon features☆21Updated last year
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated last year
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Normalizing bash administration and development across different OS-es and distributions☆10Updated last year
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆38Updated last year
- Tips to protect your personal and company data☆28Updated 4 years ago
- Easy to install, privacy protection browser setup. A collection of best browser extensions and configurations to help you fight for your …☆24Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 7 years ago
- Truehunter☆31Updated 3 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- This is the home of the CoinBlockerLists homepage.☆16Updated 6 years ago
- Current CIDR-formatted list of unwanted bots caught on my systems.☆16Updated 3 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- configure DNS/proxy for one process execution on Linux 📡☆22Updated last month
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- An organized collection of default passwords for various devices and services.☆38Updated 2 years ago