ranlo / check-google-user
Check for the existence of an email on Google platforms
☆13Updated last year
Alternatives and similar repositories for check-google-user:
Users that are interested in check-google-user are comparing it to the libraries listed below
- A C# Tool to gather information about email breaches☆13Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 7 months ago
- Powershell Scripts for Blue Team members☆12Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 10 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- ☆28Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 6 months ago
- ☆17Updated 3 months ago
- ☆27Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆14Updated 7 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆14Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated last year
- Burp extension used to snip any header from all the requests.☆22Updated last year
- bypassing the twitter safety link firewall :)☆11Updated 11 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- aiohttp LFI (CVE-2024-23334)☆26Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Updated 11 months ago
- ☆13Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated 7 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 5 months ago
- Advanced test for proxy & waf☆13Updated 6 months ago