pownjs / whoaretheyLinks
Discover target social media profiles
☆81Updated 3 years ago
Alternatives and similar repositories for whoarethey
Users that are interested in whoarethey are comparing it to the libraries listed below
Sorting:
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- ☆12Updated 3 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- penetration testing scripts☆136Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- ☆92Updated 3 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- ☆98Updated 6 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- A Report Generation Tool for Security Assessment☆65Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Updated 5 years ago