Find open databases - Powered by Binaryedge.io
☆14Jan 4, 2020Updated 6 years ago
Alternatives and similar repositories for LeakLooker
Users that are interested in LeakLooker are comparing it to the libraries listed below
Sorting:
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- GZip HTTP Bombing in Python for everyone☆43Oct 18, 2017Updated 8 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆207Nov 16, 2018Updated 7 years ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- ☆21Nov 5, 2011Updated 14 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- 基于AI的BurpSuite漏洞分析插件☆11Sep 21, 2023Updated 2 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Jul 8, 2020Updated 5 years ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- Chrome extension which sets cookies in bulk from raw header text☆13Mar 2, 2023Updated 3 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 4 years ago
- Multi tool checker account validator 2020☆36Jun 12, 2021Updated 4 years ago
- Website for Reticulum☆19Jan 17, 2026Updated last month
- ☆12Feb 16, 2023Updated 3 years ago
- AI-driven CVE search - deepest analysis of Common Vulnerabilities and Exposures (CVE)☆13Feb 22, 2024Updated 2 years ago
- Scan for AirTag MACs and Payloads without the need for an Android device or nrfConnect.☆16Oct 13, 2025Updated 4 months ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- bot python yang berbasis terminal atau CLI☆15May 1, 2023Updated 2 years ago
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆18Aug 26, 2021Updated 4 years ago
- rnsh is a command-line utility written in Python that facilitates shell sessions over Reticulum networks and aims to provide a similar ex…☆12Jan 6, 2026Updated last month
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- ☆10May 29, 2023Updated 2 years ago
- Advanced pishing tool with 30+ templates☆15May 1, 2022Updated 3 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago