jurelou / salver
Automation platform for open source intelligence
☆13Updated 2 years ago
Alternatives and similar repositories for salver:
Users that are interested in salver are comparing it to the libraries listed below
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- ☆33Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- HoneyDB Python Module☆13Updated last year
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- This tool helps you pentest THE PAST of a website.☆16Updated 4 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago