a file-sharing tool that allows you to find the responsible person in case of a leakage
☆1,100Jan 31, 2022Updated 4 years ago
Alternatives and similar repositories for wholeaked
Users that are interested in wholeaked are comparing it to the libraries listed below
Sorting:
- crawls the website and finds broken social media links that can be hijacked☆759Jan 23, 2025Updated last year
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc☆648Jan 23, 2025Updated last year
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆606Mar 19, 2022Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Oct 8, 2022Updated 3 years ago
- ☆32May 9, 2021Updated 4 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,827Feb 25, 2026Updated last week
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆406Jan 22, 2025Updated last year
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆937Mar 29, 2022Updated 3 years ago
- Türk kullanıcıların parola seçimlerinin analizi için yapılmış bir çalışmadır☆838Sep 12, 2023Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Sep 26, 2021Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- 🐙 Track down GitHub users.☆972Oct 4, 2025Updated 5 months ago
- OSINT tools and more but without API key☆1,484Feb 15, 2026Updated 3 weeks ago
- Fetch information about a public Google document.☆991Nov 14, 2023Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,187May 1, 2025Updated 10 months ago
- An HTTP toolkit for security research.☆9,327Feb 5, 2025Updated last year
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆784Jun 23, 2023Updated 2 years ago
- A browser extension for OSINT search☆1,734Feb 28, 2026Updated last week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,909Aug 15, 2023Updated 2 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- Incident Response - Fast suspicious file finder☆251Jan 24, 2026Updated last month
- GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without l…☆1,554Dec 21, 2025Updated 2 months ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,481Updated this week
- Dark Web OSINT Tool☆3,808Jan 8, 2026Updated 2 months ago
- a security scanner for custom LLM applications☆1,140Dec 1, 2025Updated 3 months ago
- 🕵️♂️ Offensive Google framework.☆18,493Feb 5, 2026Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,467Mar 27, 2025Updated 11 months ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,503Nov 16, 2025Updated 3 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping☆1,477Nov 26, 2024Updated last year
- The recursive internet scanner for hackers. 🧡☆9,468Updated this week
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆426Feb 20, 2026Updated 2 weeks ago