ppfeister / sylva
Simplify the link between social and real identities
☆10Updated 7 months ago
Alternatives and similar repositories for sylva:
Users that are interested in sylva are comparing it to the libraries listed below
- This tool uses the GitHub API to scan repositories owned by a user for email addresses and associated names. It provides options to scan …☆35Updated 3 months ago
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆30Updated 2 months ago
- Telegram video (mp4) extension manipulation PoC☆86Updated last month
- Network/host scanner and information gatherer☆26Updated last year
- Search Google Dorks like Chad. / Broken link hijacking tool.☆27Updated last month
- Leaky simplifies the management and visualization of database leak files containing credentials, enhancing efficiency in data analysis an…☆29Updated 3 months ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆13Updated 7 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI use☆38Updated 3 weeks ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆19Updated 6 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 8 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆74Updated 2 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆105Updated 9 months ago
- functions to exploit common web application vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Server-Side Request Forger…☆83Updated last year
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆19Updated last week
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆10Updated last month
- Kali Packerge Manager☆59Updated last year
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆22Updated 3 months ago
- Scripts to set up your own Android 📱 app hacking lab☆81Updated 9 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆15Updated 10 months ago
- Discord bot for the Shodan API - OSINT tool☆70Updated last year
- Bypass 403☆141Updated 2 months ago
- Google Dorking tool☆16Updated 5 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆28Updated 9 months ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆20Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆79Updated 2 weeks ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆44Updated 10 months ago
- A tool to download the breach data on BreachForums CND that was uploaded to the threat actor USDoD's CDN.☆40Updated 9 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated last year