past3ll3 / emailFinderLinks
:')
☆46Updated last week
Alternatives and similar repositories for emailFinder
Users that are interested in emailFinder are comparing it to the libraries listed below
Sorting:
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆40Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆76Updated 2 weeks ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆15Updated 5 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- 🕵️ Email osint tool☆62Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con …☆133Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆100Updated last week
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆39Updated 8 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆52Updated last month
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated 11 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated 3 weeks ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 5 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Tools and Resources for Physical Security Red Teaming☆41Updated 5 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- A blind SQL injection brute forcer☆110Updated 4 months ago
- ☆65Updated last year
- An advanced JWT extraction & decoding tool for bug bounty hunters! 🏴☠️☆42Updated 5 months ago
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆35Updated 4 months ago