Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on LinkedIn.
☆28Apr 30, 2025Updated 10 months ago
Alternatives and similar repositories for creepedin
Users that are interested in creepedin are comparing it to the libraries listed below
Sorting:
- burp extension for brazilian stuff☆28Sep 8, 2023Updated 2 years ago
- ☆10Jan 31, 2021Updated 5 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Google Workspace password sprayer with anti-captcha☆14Feb 27, 2026Updated last week
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆33Sep 10, 2025Updated 5 months ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆16Oct 2, 2025Updated 5 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆14Jul 3, 2025Updated 8 months ago
- A set of scripts to facilitate HTTP interception on mobile apps☆20Dec 9, 2025Updated 2 months ago
- A simple utility to fetch freshly updated DNS resolvers☆19Feb 17, 2024Updated 2 years ago
- Blazingly Fast, Static Godot Engine Encryption Key Extractor☆63Jan 15, 2026Updated last month
- Javascript keylogger with web panel☆20Dec 12, 2023Updated 2 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- A Burp Suite extension for Lightning/Aura framework security testing with advanced action management, context editing, and comprehensive …☆54Nov 17, 2025Updated 3 months ago
- ☆15Sep 21, 2019Updated 6 years ago
- Pentest Report Manager☆26Apr 2, 2025Updated 11 months ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Sep 25, 2023Updated 2 years ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated last month
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Let's check if your target is vulnerable for client side prototype pollution.☆65Jan 9, 2024Updated 2 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- The most powerfull Web Content Scanner☆123Jun 18, 2025Updated 8 months ago
- The only GraphQL wordlist you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆456Oct 3, 2023Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆87Nov 5, 2023Updated 2 years ago
- Organize, track, and share vulnerability findings effortlessly. This Burp Suite extension integrates with Obsidian, offering a proven not…☆37Apr 5, 2025Updated 11 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆445Jan 25, 2024Updated 2 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago