magichk / magicleaksView external linksLinks
Magicleaks it's a python script that checks if an email or a list of email accounts was compromised
☆72Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for magicleaks
Users that are interested in magicleaks are comparing it to the libraries listed below
Sorting:
- Ethical hacking, CTF, tools & etc☆22Feb 13, 2021Updated 5 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 2 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- هذه الاداة تشمل معظم الادوات المهمةبتطبيقي gnuroot & Termux☆17Apr 30, 2022Updated 3 years ago
- This Repo leverages all the things we can do with ADB commands.☆14Jun 1, 2021Updated 4 years ago
- html,css☆12Sep 24, 2021Updated 4 years ago
- ☆18Dec 23, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Command-Line Python Client for 10 Minute Mail☆42Nov 8, 2018Updated 7 years ago
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- the venom framework is a framework made in ruby filled with tools for wireless hacking, normal terminal commands, metasploit payloads and…☆19Jun 6, 2019Updated 6 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Supporting material for the frida scripting guide☆22Jul 2, 2022Updated 3 years ago
- ☆26Jul 7, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- A XSS mind map ;)☆57Jan 16, 2016Updated 10 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- People Profiler (fake script)☆25Oct 13, 2024Updated last year
- GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.☆101Jul 12, 2025Updated 7 months ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Open Source Lightweight Application and Leave management software written in PHP under MIT License.☆11Apr 30, 2017Updated 8 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Advance Tiktok Fake Followers Phishing Page☆38Dec 16, 2020Updated 5 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- My Personal Notes of OSEP☆39Jun 1, 2023Updated 2 years ago
- self-hosted invoicing platform to create & email invoices, track payments and expenses, and time billable tasks & projects for clients.☆11Feb 8, 2026Updated last week
- Eltima Port Virtualization Technology may be integrated to the software or hardware solutions to get the remote access to network devices☆10Jun 6, 2018Updated 7 years ago
- ☆14Jul 29, 2018Updated 7 years ago
- Infographiq, ie intelligent interactive infographics, core JavaScript library☆11Jan 17, 2024Updated 2 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 4 months ago
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago