jobroche / PastepwndView external linksLinks
Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper
☆38Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for Pastepwnd
Users that are interested in Pastepwnd are comparing it to the libraries listed below
Sorting:
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- A python based LinkedIn enumeration tool☆569Jul 11, 2023Updated 2 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- ☆22Mar 16, 2020Updated 5 years ago
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- ☆22Apr 23, 2024Updated last year
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 6 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Dec 17, 2025Updated last month
- Useful commands for infosec☆28Feb 13, 2023Updated 3 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- Big Iron Recon & Pwnage☆124Nov 8, 2021Updated 4 years ago
- A framework for stealthy domain reconnaissance☆302Oct 14, 2021Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Powershell Threat Hunting Module☆289Sep 21, 2016Updated 9 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Sep 16, 2019Updated 6 years ago
- OSINT Browser Plugins☆38Jun 9, 2017Updated 8 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago