trufflesecurity / EmailGraffiti
Vandalize old emails. Like an NFT that's easy to prove ownership of.
☆35Updated last year
Alternatives and similar repositories for EmailGraffiti:
Users that are interested in EmailGraffiti are comparing it to the libraries listed below
- ☆61Updated 3 months ago
- ☆17Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆22Updated 5 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- ☆90Updated 3 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆32Updated 2 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆33Updated 8 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Pentesting post exploitation tool for slack☆20Updated 6 months ago
- ☆45Updated 9 months ago
- An Evil OIDC Server☆53Updated 2 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Additional active scan checks for BURP☆26Updated 6 months ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- ☆110Updated last year
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- ☆58Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Qemuno Framework☆24Updated 2 years ago
- wordlists for password cracking☆27Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago