r7wx / dump-hub
Self hosted search engine for data leaks and password dumps
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for dump-hub
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- A semi-automatic osint/recon framework.☆24Updated 5 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A tool to check for response status codes with ease☆14Updated last year
- PHP tool to grab urls of a specific site.☆10Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fingerprinting, Port Scanning, Directory Brute Forcing, it's got it all!☆15Updated 4 years ago
- ☆12Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- ☆16Updated last year
- Files related to my training classes☆15Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 4 years ago
- recover Firefox and more browsers logins☆47Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Updated 2 years ago
- ☆8Updated 3 years ago
- Open YARA scan- and search engine☆16Updated this week
- Docker kinsing malware bitcoin/xmr miner☆22Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago