mthbernardes / HouseProxyLinks
Protect your parents from phishing
☆39Updated 7 years ago
Alternatives and similar repositories for HouseProxy
Users that are interested in HouseProxy are comparing it to the libraries listed below
Sorting:
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
- ☆68Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated 11 months ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Leak File Analyzer☆62Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆79Updated 6 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago