pownjs / whoaretheyLinks
Discover target social media profiles
☆81Updated 2 years ago
Alternatives and similar repositories for whoarethey
Users that are interested in whoarethey are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- penetration testing scripts☆136Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Pypykatz server☆125Updated 6 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 5 months ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 4 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- Bash Bunny fun!☆52Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- ☆12Updated 2 years ago
- A tool to enumerate network services☆25Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Hacking challenges☆31Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Plaintext Password harvesting from Azure Windows VMs☆67Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- ☆122Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago