☆68Aug 16, 2021Updated 4 years ago
Alternatives and similar repositories for WhoAmIMailBot
Users that are interested in WhoAmIMailBot are comparing it to the libraries listed below
Sorting:
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 8 months ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- Phishing on Twitter☆251Jun 21, 2018Updated 7 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- A simple bash script that does its best to automate and visualize differential benchmarking for Go projects.☆20Apr 23, 2018Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Dec 10, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆13May 3, 2017Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- Arduino code and Odroid-C1 (or Raspberry PI) python code to control TI cc1100 and cc1101 transceivers. Also known as: RF1100SE and RF110…☆13Feb 28, 2017Updated 9 years ago
- ☆12May 10, 2021Updated 4 years ago
- Extreme Vulnerable Node Application☆95Nov 12, 2018Updated 7 years ago
- GTRS - Google Translator Reverse Shell☆624Sep 26, 2025Updated 5 months ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Easy way to brute-force web directory.☆161Jun 2, 2019Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Oct 30, 2024Updated last year
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago