Proof of concept for a security issue (in my opinion) that I found in accounts.google.com
☆22Jun 3, 2014Updated 11 years ago
Alternatives and similar repositories for gHarvester
Users that are interested in gHarvester are comparing it to the libraries listed below
Sorting:
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- Open source tool that uses censys and shodan for passive recon.☆13May 20, 2016Updated 9 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆13Jan 3, 2018Updated 8 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- Some NSE scripts to search information from routers☆36Nov 30, 2015Updated 10 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Jun 11, 2019Updated 6 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- ☆22May 20, 2016Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Bash script to help upgrade older distros to newer versions, and crossgrade from 32 to 64 bits☆23Jan 5, 2026Updated 2 months ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆109Jan 20, 2018Updated 8 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- A badass grabbing tool for getting PDF's of books.☆26Aug 23, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Crime and Criminal Analysis System integrating geospatial, temporal, and demographic analytics for predictive modeling of criminal activ…☆12Aug 27, 2024Updated last year
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- CLP Principles by the Liquid Legal Institute☆11Apr 12, 2021Updated 4 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- The FOSS-Cloud webinterface.☆14Aug 25, 2017Updated 8 years ago
- CSV converter to TAO QTI Package☆12Mar 23, 2020Updated 5 years ago
- Code for scraping obituaries from Legacy.com. 3 steps: scrape URLs & paragraphs then extract age, sex, & race☆12Dec 9, 2022Updated 3 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- This is a demo project to compare two web scrapping frameworks, Playwright and Selenium and using the new Pipelining tool Dagster☆15Sep 9, 2021Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- GUI for monitoring cast-xmr☆10Apr 13, 2018Updated 7 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Scrapes Facebook profile pages using a normal login (without an API key)☆32Nov 11, 2020Updated 5 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago