Get detailed information about a Twitter user activity
☆101Mar 24, 2015Updated 10 years ago
Alternatives and similar repositories for tinfoleak
Users that are interested in tinfoleak are comparing it to the libraries listed below
Sorting:
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Hack any Instagram account through bruteforce.☆10Sep 24, 2021Updated 4 years ago
- A simple keylogger application for XSS attack.☆16Aug 13, 2017Updated 8 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆32Aug 29, 2021Updated 4 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- An Amazon OSINT scraper for potential scam accounts☆33Jan 17, 2019Updated 7 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Aug 28, 2015Updated 10 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI☆40May 17, 2014Updated 11 years ago
- Exfiltrate files via DNS☆95Aug 29, 2013Updated 12 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 4 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- The source code for the simple bot we created in a video.☆10Feb 26, 2018Updated 8 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33May 24, 2016Updated 9 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- A scanner for SIP proxies vulnerable to Shellshock☆112Aug 13, 2016Updated 9 years ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago