osirislab / LeakyPastes-V2
Looking at what people post to public pastebins
☆22Updated this week
Alternatives and similar repositories for LeakyPastes-V2:
Users that are interested in LeakyPastes-V2 are comparing it to the libraries listed below
- Resources for reverse engineering “unofficial APIs”.☆41Updated 2 weeks ago
- A proof of concept Proton CAPTCHA solver.☆25Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Updated 2 years ago
- Automation of the javascript deobfuscation process☆22Updated last month
- SearchLoupe lets you perform a single search and get results from different search engines.☆18Updated 11 months ago
- A command-line tool for scraping and checking HTTP and SOCKS5 proxies from the checkerproxy.net proxies archive☆27Updated this week
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Updated last year
- HTTP proxy with per-request uTLS fingerprint mimicry and upstream proxy tunneling. Currently WIP.☆39Updated last year
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆26Updated 7 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆28Updated 9 months ago
- Z Anti-Anti-Debugger for Linux☆48Updated 2 months ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older ver…☆13Updated 2 months ago
- A Selenium implementation to bypass Google Recaptcha V2 using Capsolver API.☆14Updated 7 months ago
- 🐞Soothing pastel theme for IDA (Interactive Disassembler)☆54Updated last year
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆132Updated 2 weeks ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆117Updated 6 months ago
- Minimalistic port-spoofer written in Python☆11Updated 3 months ago
- Tool to extract contents from the memory of Windows systems.☆14Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 7 months ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆21Updated last year
- socket for handling chrome-developer-protocol connections☆17Updated last year
- ☆34Updated 2 years ago
- Guide to searching in different file types (documents, breaches, databases, etc.)☆52Updated 11 months ago
- Frida scripts to directly MitM all HTTPS traffic from a target mobile application☆10Updated last year
- Intercept request using Selenium with Chrome☆17Updated last year
- How long will it take to crack a hash ?☆29Updated 5 years ago
- Tools for pentesting Google APIs☆62Updated 3 months ago
- JavaScript Reverse Engineering Toolkit (JSRETK) - Experimental tools for analyzing (minified/obfuscated) JavaScript☆49Updated 3 months ago
- A web service to clean documents from potentially privacy-invasive metadata☆51Updated this week