kahunalu / pwnbin
Python Pastebin Webcrawler that returns list of public pastebins containing keywords
☆428Updated 3 years ago
Alternatives and similar repositories for pwnbin:
Users that are interested in pwnbin are comparing it to the libraries listed below
- information gathering via dorks☆377Updated 2 years ago
- The Credential Mapper☆440Updated 7 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆453Updated 5 years ago
- ☆268Updated 3 years ago
- Pastebin OSINT Harvester☆320Updated 5 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆341Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆606Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆170Updated 7 years ago
- Email recon made fast and easy, with a framework to build on☆955Updated 2 years ago
- ☆510Updated last year
- SpeedPhishing Framework☆441Updated 5 years ago
- ☆423Updated 7 years ago
- Twitter Back From The Dead looks in a user tweets history for domain names that are available for registration☆217Updated 5 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- ☆278Updated 4 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆401Updated 5 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆625Updated 2 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆146Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- ☆601Updated 3 months ago
- A fully featured backdoor that uses Twitter as a C&C server☆768Updated 4 years ago
- Maltego Penetration Testing Transforms☆362Updated 5 years ago
- Specify targets and run sets of tools against them☆385Updated 5 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆467Updated 8 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆267Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- Automater - IP URL and MD5 OSINT Analysis☆539Updated 5 months ago
- A python based LinkedIn enumeration tool☆546Updated last year