securethelogs / Powersosh
#OSINT - Search username on socials
☆12Updated 5 years ago
Alternatives and similar repositories for Powersosh
Users that are interested in Powersosh are comparing it to the libraries listed below
Sorting:
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 10 months ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- ☆33Updated 3 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 5 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆27Updated 3 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Updated 5 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago