khast3x / LeakLookerLinks
Find open databases - Powered by Binaryedge.io
☆15Updated 5 years ago
Alternatives and similar repositories for LeakLooker
Users that are interested in LeakLooker are comparing it to the libraries listed below
Sorting:
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- An automated e-mail OSINT tool☆22Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 4 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated this week
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆33Updated 5 months ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆12Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Just a better dirbuster☆13Updated 2 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆56Updated last year
- Rockyou for web fuzzing☆14Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year