vflame6 / leakerLinks
Passive leak enumeration tool.
☆260Updated 2 weeks ago
Alternatives and similar repositories for leaker
Users that are interested in leaker are comparing it to the libraries listed below
Sorting:
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆208Updated last month
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆225Updated 5 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆72Updated 6 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- ☆169Updated last month
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆121Updated 4 months ago
- ☆144Updated 8 months ago
- ☆65Updated last year
- Analyze Android native `.so` files☆119Updated 6 months ago
- DorkEye is a Python OSINT and reconnaissance tool designed for ethical dorking. It automates searches to detect unintentionally exposed r…☆72Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆108Updated 5 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆302Updated 2 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Laravel RCE Exploitation Toolkit☆50Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 4 months ago
- Discovering Typo Squatting on your domains!☆81Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆123Updated this week
- 🕵️ Email osint tool☆64Updated 2 years ago
- A real fake social engineering app☆130Updated 6 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆228Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆86Updated 2 weeks ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Updated 7 months ago