needmorecowbell / HamburglarLinks
Hamburglar -- collect useful information from urls, directories, and files
☆319Updated 2 years ago
Alternatives and similar repositories for Hamburglar
Users that are interested in Hamburglar are comparing it to the libraries listed below
Sorting:
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆421Updated last month
- Pastebin OSINT Harvester☆326Updated 6 years ago
- ☆278Updated 5 years ago
- Various Tools and Docker Images☆280Updated 7 months ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆177Updated 6 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆168Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- A powerful target reconnaissance framework powered by graph theory.☆418Updated 3 years ago
- Vulners Python API wrapper☆368Updated 3 weeks ago
- a CLI for ephemeral penetration testing☆15Updated 5 years ago
- A script that automates generation of OpenSSL reverse shells☆303Updated 5 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆17Updated 4 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆255Updated 8 years ago
- penetration testing scripts☆136Updated 6 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 7 years ago
- Scripts that are useful for me on pen tests☆537Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆187Updated last year
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆792Updated 5 years ago
- A Github organization reconnaissance tool.☆219Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 3 months ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆136Updated 5 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆276Updated 2 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago