urbanadventurer / urlcrazyLinks
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
☆646Updated 3 months ago
Alternatives and similar repositories for urlcrazy
Users that are interested in urlcrazy are comparing it to the libraries listed below
Sorting:
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,140Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆653Updated 2 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆302Updated 2 years ago
- fully automated pentesting tool☆517Updated 2 years ago
- Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Crackin…☆414Updated 2 months ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆619Updated 6 months ago
- A Holistic OSINT and Threat Hunting Platform☆528Updated 10 months ago
- OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.☆311Updated 4 years ago
- OSINT Template Engine☆558Updated 2 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆515Updated this week
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆539Updated last year
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆915Updated 4 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆378Updated last year
- Divide full port scan results and use it for targeted Nmap runs☆329Updated last year
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆462Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,233Updated 8 months ago
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆417Updated 2 years ago
- Continuous reconnaissance network scanner designed for large-scale scans, collecting information on all Internet assets.☆257Updated 3 years ago
- uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or direc…☆838Updated 3 years ago
- Utility to download and extract document metadata from an organization. This technique can be used to identify: domains, usernames, softw…☆501Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,246Updated 3 months ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆377Updated 3 years ago
- This Python script can be used to bypass IP source restrictions using HTTP headers.☆397Updated 2 months ago
- TREVORspray is a modular password sprayer with threading, clever proxying, loot modules, and more!☆1,256Updated last month
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆652Updated this week
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,559Updated last year
- evilginx3 + gophish☆1,907Updated last year
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆503Updated 5 years ago
- Awesome cloud enumerator☆1,059Updated 8 months ago
- Zero Infrastructure Password Cracking☆411Updated last year