Fucking Search Engines Scraper - python library to scrap url's from search engines
☆49Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for fses
Users that are interested in fses are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Apr 7, 2023Updated 2 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Tool to automatic leak information using Hacking with engine searches☆93May 9, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago