visualbasic6 / searchLinks
a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature
☆49Updated last year
Alternatives and similar repositories for search
Users that are interested in search are comparing it to the libraries listed below
Sorting:
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 4 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 5 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- ☆16Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- masscan with exclusive excludes☆56Updated last year
- miscellaneous sploit scripts/hacks☆16Updated 3 months ago
- Python wrappers for mal_unpack☆36Updated last year
- Mimikatz embedded as classes☆28Updated 3 years ago
- Beautify Nessus scan output☆11Updated last year
- ☆28Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- API hooking and code injection made easy!☆37Updated last year
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ☆17Updated 7 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆26Updated last week
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.☆40Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago