securethelogs / Powersosh
#OSINT - Search username on socials
☆12Updated 4 years ago
Alternatives and similar repositories for Powersosh:
Users that are interested in Powersosh are comparing it to the libraries listed below
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago
- TORAPF is a Tor Network Admin Page Finder Tool.It can help to get admin page from tor network.☆12Updated 4 years ago
- Perform OSINT on external targets using Shodan☆21Updated 11 months ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆28Updated 6 months ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and T…☆11Updated 2 years ago
- ☆34Updated last week
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago