kahunalu / pwnbin
Python Pastebin Webcrawler that returns list of public pastebins containing keywords
☆433Updated 3 years ago
Alternatives and similar repositories for pwnbin:
Users that are interested in pwnbin are comparing it to the libraries listed below
- information gathering via dorks☆382Updated 2 years ago
- ☆269Updated 4 years ago
- The Credential Mapper☆440Updated 7 years ago
- Specify targets and run sets of tools against them☆389Updated 5 years ago
- Pastebin OSINT Harvester☆323Updated 5 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆452Updated 5 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆343Updated 3 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆169Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆147Updated 7 years ago
- Twitter Back From The Dead looks in a user tweets history for domain names that are available for registration☆217Updated 7 months ago
- Passive Vulnerability Auditor☆131Updated 8 years ago
- Scripts that are useful for me on pen tests☆525Updated 2 years ago
- The Hacker's ToolBox☆186Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Does some google dorks against a domain☆166Updated 5 years ago
- Command-line tool to scan Google search results for vulnerabilities☆520Updated this week
- A python based LinkedIn enumeration tool☆551Updated last year
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- ☆192Updated 6 years ago
- ☆280Updated 4 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare☆297Updated 6 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- A fast and stealthy credential harvester☆623Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- ☆425Updated 7 years ago