a file-sharing tool that allows you to find the responsible person in case of a leakage
☆1,096Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for wholeaked
Users that are interested in wholeaked are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- crawls the website and finds broken social media links that can be hijacked☆766Jan 23, 2025Updated last year
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,677Jan 23, 2025Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,478Oct 8, 2022Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,559Dec 21, 2025Updated 4 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,907Apr 28, 2026Updated last week
- Fetch information about a public Google document.☆1,003Nov 14, 2023Updated 2 years ago
- 🐙 Track down GitHub users.☆980Oct 4, 2025Updated 7 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆945Mar 29, 2022Updated 4 years ago
- A browser extension for OSINT search☆1,779Apr 13, 2026Updated 3 weeks ago
- An HTTP toolkit for security research.☆10,173Feb 5, 2025Updated last year
- The recursive internet scanner for hackers. 🧡☆9,655Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 🕵️♂️ Offensive Google framework.☆18,881Apr 10, 2026Updated last month
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,977Aug 15, 2023Updated 2 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,601Mar 21, 2026Updated last month
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,491Apr 1, 2026Updated last month
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆407Jan 22, 2025Updated last year
- Dark Web OSINT Tool☆4,048Jan 8, 2026Updated 4 months ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,677Apr 20, 2026Updated 2 weeks ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆842Aug 16, 2022Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆2,639Jul 26, 2024Updated last year
- OnionSearch is a script that scrapes urls on different .onion search engines.☆1,683Aug 8, 2024Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,562Updated this week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,524Nov 26, 2024Updated last year
- ☆209Feb 24, 2022Updated 4 years ago
- OSINT tools and more but without API key☆1,515Feb 15, 2026Updated 2 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,221Apr 13, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Terminal-based toolkit for GitHub data analysis.☆1,895Feb 28, 2026Updated 2 months ago
- Incident Response - Fast suspicious file finder☆257Jan 24, 2026Updated 3 months ago
- Semi-automatic OSINT framework and package manager☆2,436Jan 31, 2025Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Batch software uninstall☆103Feb 12, 2022Updated 4 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,658Apr 13, 2026Updated 3 weeks ago