Magicleaks it's a python script that checks if an email or a list of email accounts was compromised
☆72Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for magicleaks
Users that are interested in magicleaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- Examples for using the Pipl SEARCH API☆11Dec 19, 2023Updated 2 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- a repository of all the CTF challenges I've made for public events☆63Jul 30, 2025Updated 8 months ago
- ☆18Dec 23, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pretty random INTERNET syn/ack scanner, useful for finding specific alive ports for research.☆25Nov 12, 2022Updated 3 years ago
- Final Project for CY4740 Network Security☆24Apr 23, 2021Updated 4 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- html,css☆12Sep 24, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- Bluetooth rubberducky, Keyboard & Mouse Emulator for Kali NetHunter and NetHunter Pro☆15Nov 30, 2025Updated 4 months ago
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of my favorite Bookmarks over the last 15 years.☆13Aug 11, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- ☆11Jun 8, 2022Updated 3 years ago
- People Profiler (fake script)☆27Oct 13, 2024Updated last year
- ☆12Dec 1, 2013Updated 12 years ago
- GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.☆102Jul 12, 2025Updated 8 months ago
- This Repo leverages all the things we can do with ADB commands.☆14Jun 1, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Socks5 & Socks4 & HTTPS IP:PORT proxy list are updated occasionally. Proxy list source links & API links☆13Apr 7, 2025Updated last year
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Example: Client-Side Template Injection with Vue☆25Feb 20, 2023Updated 3 years ago
- An official clone of Android's NetHunter app for GNU/Linux Operating Systems and Phones. Initially built for PinePhone.☆88Oct 2, 2025Updated 6 months ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 9 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- CTF writeups☆16Nov 20, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆39Sep 28, 2019Updated 6 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆15Mar 11, 2024Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Twitch Streamer Analysis, see Twitchverse https://towardsdatascience.com/twitchverse-a-network-analysis-of-twitch-universe-using-neo4j-gr…☆18Oct 25, 2024Updated last year
- A social media analytical tool that provides the useful insights and meaningful stats that helps in the enhancing your social media prese…☆10Oct 21, 2020Updated 5 years ago
- deface-X is an automatic deface tool used to inject a website☆13Oct 16, 2025Updated 5 months ago