A badass grabbing tool for getting PDF's of books.
☆26Aug 23, 2018Updated 7 years ago
Alternatives and similar repositories for pdf-get
Users that are interested in pdf-get are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 7 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Oct 3, 2018Updated 7 years ago
- Loader and RunPE file executer☆19Jun 12, 2019Updated 6 years ago
- Docker container to run PoisonTap☆15Dec 8, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 9 years ago
- Search your reddit saved links☆12Feb 20, 2017Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆16Aug 6, 2020Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- This repository includes some r2frida scripts to monitor iOS and Android Mobile apps.☆11Dec 21, 2021Updated 4 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Bing Dork Scanner and simple sqli-injection checker☆15Jun 6, 2018Updated 7 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆47May 5, 2019Updated 6 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- A multithreaded rewrite of the classic theHarvester email address collection script.☆56Mar 26, 2026Updated 2 weeks ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts I use to setup a new macOS or Linux machine for iOS research☆17Feb 24, 2019Updated 7 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- webkit; but pwned☆10Jan 28, 2019Updated 7 years ago
- Capture The Flag Information☆12Dec 7, 2018Updated 7 years ago