visualbasic6 / search
a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature
☆49Updated last year
Alternatives and similar repositories for search:
Users that are interested in search are comparing it to the libraries listed below
- masscan with exclusive excludes☆55Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- ☆16Updated 6 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆41Updated this week
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated last month
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- miscellaneous sploit scripts/hacks☆14Updated 6 months ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated 8 months ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆50Updated last year
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Local Privilege Escalation Miner☆23Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated this week
- Distributed phishing framework designed to streamline offensive security phishing☆39Updated last year
- ☆27Updated last year
- ☆37Updated 9 months ago
- Configurable, Community driven, HTTP C2 Profile☆14Updated 2 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- ☆19Updated 4 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆17Updated last year
- ☆17Updated 3 years ago