Magicleaks it's a python script that checks if an email or a list of email accounts was compromised
☆72Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for magicleaks
Users that are interested in magicleaks are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- a repository of all the CTF challenges I've made for public events☆63Jul 30, 2025Updated 7 months ago
- ☆18Dec 23, 2024Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Jul 17, 2023Updated 2 years ago
- A reverse proxying program to allow services e.g. Nextcloud, Bitwarden etc to be accessed over Tor (SOCKS5) even when the client app do n…☆24Oct 21, 2024Updated last year
- Text to audio with Tik-Tok Voices☆13Apr 6, 2023Updated 2 years ago
- Instagram Session ID Brute-forcer☆11Oct 8, 2022Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- Final Project for CY4740 Network Security☆24Apr 23, 2021Updated 4 years ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- html,css☆12Sep 24, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A curated list of my GitHub stars!☆18Updated this week
- ☆21May 8, 2022Updated 3 years ago
- App to sync pocket operator devices☆14Feb 8, 2023Updated 3 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- A bot that scrapes your jobs in real time, sort them according to preferences and runs an alert☆16Nov 14, 2024Updated last year
- ofrip - OnlyFans ripper☆16Mar 21, 2020Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Proxmark guide☆20Feb 7, 2025Updated last year
- OSCP Preperation☆14Aug 12, 2021Updated 4 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- ☆12Dec 1, 2013Updated 12 years ago
- People Profiler (fake script)☆25Oct 13, 2024Updated last year
- https://github.com/infosecn1nja/AD-Attack-Defense☆16Jan 22, 2022Updated 4 years ago
- CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)☆12Jan 15, 2024Updated 2 years ago
- GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.☆102Jul 12, 2025Updated 8 months ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- This project reads data from a csv(MS Excel) file containing numeric data and then stores it into a 2D array in C++;☆10Mar 13, 2017Updated 9 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago