khast3x / LeakLooker
Find open databases - Powered by Binaryedge.io
☆13Updated 5 years ago
Alternatives and similar repositories for LeakLooker:
Users that are interested in LeakLooker are comparing it to the libraries listed below
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated last year
- ☆34Updated 3 weeks ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Custom pentesting tools☆24Updated 4 years ago
- An automated e-mail OSINT tool☆20Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 9 months ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆24Updated 6 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Onionnux is a onionsite(DEEPNET/DARKNET) tool.It can help to idenitfy onionsite is active or onionsite server name.☆17Updated 3 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Updated 6 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago