Discover target social media profiles
☆81Sep 26, 2022Updated 3 years ago
Alternatives and similar repositories for whoarethey
Users that are interested in whoarethey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Funnel is a lightweight yara-based feed scraper☆38May 22, 2023Updated 2 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆262Apr 7, 2023Updated 2 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆28Dec 28, 2017Updated 8 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Powershell script to exfiltrate large files quickly and securely☆125May 4, 2022Updated 3 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 4 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Drupal Honeypot☆58Jul 14, 2019Updated 6 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆825Nov 15, 2025Updated 4 months ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Targeted Payload Execution☆100Apr 9, 2020Updated 5 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Social media profile aggregator for node.js☆23Jul 30, 2014Updated 11 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆54Aug 13, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- A simple email generator that uses dorks on Bing to generate emails from LinkedIn Profiles.☆151Oct 19, 2022Updated 3 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 4 years ago