m4n3dw0lf / vampy
VAMPY - Minimal tool for RAM dumping.
☆10Updated 7 years ago
Alternatives and similar repositories for vampy:
Users that are interested in vampy are comparing it to the libraries listed below
- Network Guardian☆12Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 9 years ago
- log file scrubber☆16Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆81Updated 9 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago