secworld / Breach-MinerLinks
A tool to harvest credentials from leaked data dump
☆77Updated 3 years ago
Alternatives and similar repositories for Breach-Miner
Users that are interested in Breach-Miner are comparing it to the libraries listed below
Sorting:
- Python util to retrieve full display name and profile picture from a single email address☆103Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆87Updated 6 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Updated 6 years ago
- Retrieve someones private Facebook location, using their public information.☆57Updated 4 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- A multithreaded rewrite of the classic theHarvester email address collection script.☆53Updated 3 months ago
- Hidden Friends Finder (HFF) for Facebook☆71Updated 2 years ago
- SMS Phishing Tools☆80Updated 8 years ago
- Darknet OSINT Transform☆124Updated 7 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆46Updated 10 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 5 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- Command line go0gle dorking tool☆139Updated 12 years ago
- Does some google dorks against a domain☆165Updated 5 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Updated 4 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Updated 10 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆103Updated 8 years ago
- Use Tor for anonymous scanning with nmap☆87Updated 10 years ago
- Maltego Local Transforms for Facebook☆76Updated 7 years ago
- Useful for digital forensics investigations or initial black-box pentest footprinting.☆145Updated 4 years ago
- Utilizing various Open Source Intelligence (OSINT) tools and techniques that we have found to be effective, DataSploit brings them all in…☆30Updated 8 years ago
- A document metadata spider.☆74Updated 9 years ago
- OSINT tools and scripts☆58Updated 5 years ago
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆177Updated 8 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆242Updated 5 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 8 years ago
- An automated Wireless RogueAP MITM attack framework.☆187Updated 6 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago