Passive leak enumeration tool.
☆302Apr 28, 2026Updated last week
Alternatives and similar repositories for leaker
Users that are interested in leaker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Feb 18, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 4 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- Awesome MalDev Links☆58Apr 28, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Impacket☆50Feb 25, 2026Updated 2 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆83Mar 16, 2026Updated last month
- ☆26Mar 11, 2025Updated last year
- An Obsidian-Based Second Brain for CyberSecurity Analysts and Professionals☆57Feb 18, 2026Updated 2 months ago
- ☆28Apr 2, 2021Updated 5 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from them☆19Updated this week
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆108Apr 16, 2026Updated 2 weeks ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12May 2, 2022Updated 4 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 5 months ago
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆86Apr 19, 2026Updated 2 weeks ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Dec 30, 2024Updated last year
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- Aliasr is a modern, feature-rich TUI launcher for pentest commands.☆109Apr 23, 2026Updated last week
- ☆61Oct 24, 2024Updated last year
- ☆19Sep 17, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆78Feb 15, 2026Updated 2 months ago
- Rewrite to fit my needs☆33Jul 20, 2024Updated last year
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- Unmask real IP address of a domain hidden behind Cloudflare by IPs bruteforcing☆25Dec 3, 2024Updated last year
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- ☆13Jan 15, 2026Updated 3 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Permanently disable EDRs as local admin☆129Dec 19, 2025Updated 4 months ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Detonate malware on VMs and get logs & detection status☆88Updated this week
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- ☆20Jan 19, 2021Updated 5 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated last month
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆129Jan 26, 2026Updated 3 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆36Apr 29, 2026Updated last week