Intelligence gathering framework
☆16Jul 23, 2015Updated 10 years ago
Alternatives and similar repositories for intrigue-core
Users that are interested in intrigue-core are comparing it to the libraries listed below
Sorting:
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆15Apr 28, 2022Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆54Oct 1, 2015Updated 10 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆12Jan 9, 2026Updated last month
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆14Sep 23, 2022Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- This small script can download or update all the GitHub repo of your choice.☆22Apr 13, 2024Updated last year
- My personal repository☆13Jan 18, 2026Updated last month
- Network Policy Helper☆30Feb 9, 2026Updated 3 weeks ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- Nuclei Templates Directory☆57Feb 17, 2026Updated 2 weeks ago
- ☆15Sep 21, 2019Updated 6 years ago
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- redlotus☆28Feb 14, 2019Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Mar 29, 2021Updated 4 years ago
- Notes for efficient and easier engagements - notes over time☆24Apr 1, 2021Updated 4 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Sep 6, 2024Updated last year
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆32Dec 30, 2020Updated 5 years ago
- ☆10May 4, 2019Updated 6 years ago
- Bitcoin miner runs at the possible highest speed your pc can handle☆11Nov 1, 2022Updated 3 years ago
- Hack your victo web cam☆10Feb 9, 2022Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆30Feb 6, 2023Updated 3 years ago
- Connectivity notification tool for Android☆11Oct 25, 2014Updated 11 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago