lanjelot / web-hunter
Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain
☆48Updated 4 years ago
Alternatives and similar repositories for web-hunter:
Users that are interested in web-hunter are comparing it to the libraries listed below
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- ☆19Updated 9 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- A web app scanner☆26Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 7 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago