sunw4r / creepedinLinks
Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on LinkedIn.
☆25Updated last month
Alternatives and similar repositories for creepedin
Users that are interested in creepedin are comparing it to the libraries listed below
Sorting:
- ☆55Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆68Updated 2 years ago
- Colored Cat is a syntax highlighter file reader.☆16Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- ☆74Updated last year
- ☆14Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆55Updated last year
- ☆25Updated 2 years ago
- ☆64Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- Azure Service Subdomain Enumeration☆61Updated 9 months ago
- ☆21Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- Filter URLs to save your time.☆60Updated 2 years ago
- Creates and sends fake meeting invite☆64Updated 4 years ago
- ☆20Updated 3 years ago
- Mind Maps for penetration testing☆20Updated 4 years ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- ☆18Updated 2 years ago
- ☆30Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year