Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on LinkedIn.
☆29Apr 30, 2025Updated 11 months ago
Alternatives and similar repositories for creepedin
Users that are interested in creepedin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- burp extension for brazilian stuff☆28Sep 8, 2023Updated 2 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- Google Workspace password sprayer with anti-captcha☆14Mar 11, 2026Updated last month
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆14May 28, 2022Updated 3 years ago
- A set of scripts to facilitate HTTP interception on mobile apps☆22Mar 11, 2026Updated last month
- ☆18Apr 16, 2025Updated last year
- Python script that performs email address validation against Office 365 without submitting login attempts.☆16Mar 11, 2026Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Simple script with dependency on POSIX sh(1) to gather info from the running system. The result of the script is report-like HTML file wi…☆18Feb 15, 2026Updated 2 months ago
- 💬 Sentiment analyzer library using SentiWordnet in Go☆11Mar 11, 2021Updated 5 years ago
- A self hostable, productivity manager.☆10Aug 12, 2023Updated 2 years ago
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆62Mar 2, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Purpose-built Red Team network hardware implant made from common components.☆28Mar 18, 2023Updated 3 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- Templating with sinister modules☆16Jun 20, 2023Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- ☆69Jun 8, 2023Updated 2 years ago
- Javascript file change monitoring☆17Mar 13, 2026Updated last month
- ☆12Jun 12, 2021Updated 4 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 9 months ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated privilege escalation of the world's most popular Docker images.☆70Sep 25, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆22Sep 10, 2025Updated 7 months ago
- Guía completa para configurar y utilizar servicios financieros NO-KYC. Este repositorio cubre herramientas de finanzas digitales anónimas…☆16Aug 7, 2024Updated last year
- The most powerfull Web Content Scanner☆124Jun 18, 2025Updated 9 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- ☆63Sep 28, 2022Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Pentest Report Manager☆26Apr 2, 2025Updated last year
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Blockchain Challs from HACON2020 CTF☆13Sep 22, 2021Updated 4 years ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- Payloads for Web Application Security Testing☆15Dec 1, 2025Updated 4 months ago
- ☆11May 30, 2021Updated 4 years ago