secana / TransNetLinks
.Net library to create Maltego transformations.
☆18Updated 5 months ago
Alternatives and similar repositories for TransNet
Users that are interested in TransNet are comparing it to the libraries listed below
Sorting:
- Transform to check if email is registered on Facebook.com☆23Updated 12 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18Updated 11 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Updated 4 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆22Updated 12 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 7 months ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- A transform to show the latest copy of the website from the Wayback Machine☆17Updated 10 years ago
- Python wrapper for the Spyonweb API. Not affiliated with SpyOnWeb.com or DevHQ.☆20Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Various exploits☆10Updated 8 years ago
- Python tool for Dorking☆11Updated 2 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Domaintools addon for Maltego☆16Updated 12 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆12Updated 8 years ago
- Various Crypter Project☆9Updated 11 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago