josephmisiti / spammer
A tool for collecting compromised email address
☆9Updated 9 years ago
Alternatives and similar repositories for spammer:
Users that are interested in spammer are comparing it to the libraries listed below
- Port scanning and domain utility.☆30Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆13Updated 12 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- HoneyDB Python Module☆13Updated last year
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago