visualbasic6 / searchLinks
a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature
☆48Updated last year
Alternatives and similar repositories for search
Users that are interested in search are comparing it to the libraries listed below
Sorting:
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- masscan with exclusive excludes☆57Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 5 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Encrypt your git repo...☆48Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- miscellaneous sploit scripts/hacks☆16Updated 5 months ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆9Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆14Updated last year
- ☆42Updated 3 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated last month
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated last month
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆30Updated this week
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- ☆28Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- wordlists for password cracking☆28Updated 2 years ago
- ☆16Updated 2 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 7 years ago