mirror of
https://github.com/byReqz/blackmate.git
synced 2025-06-15 11:37:47 +00:00
Add files via upload
This commit is contained in:
@ -17,7 +17,7 @@ fbid|11.b8106f8|Show info about the author by facebook photo url.|https://github
|
||||
flashlight|107.39594b5|Automated Information Gathering Tool for Penetration Testers.|https://github.com/galkan/flashlight
|
||||
geoedge|0.2|This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).|
|
||||
githack|6.b83a744|A `.git` folder disclosure exploit.|https://github.com/lijiejie/githack
|
||||
gitminer|23.28d2cec|Tool for advanced mining for content on Github.|https://github.com/danilovazb/GitMiner
|
||||
gitminer|29.e25f339|Tool for advanced mining for content on Github.|https://github.com/danilovazb/GitMiner
|
||||
goodork|2.2|A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.|http://goo-dork.blogspot.com/
|
||||
goofile|1.5|Command line filetype search|https://code.google.com/p/goofile/
|
||||
goog-mail|1.0|Enumerate domain emails from google.|http://www.darkc0de.com/others/goog-mail.py
|
||||
@ -27,7 +27,7 @@ hasere|1.0|Discover the vhosts using google and bing.|https://github.com/galkan/
|
||||
idswakeup|1.0|A collection of tools that allows to test network intrusion detection systems.|http://www.hsc.fr/ressources/outils/idswakeup/index.html.en
|
||||
intrace|1.5|Traceroute-like application piggybacking on existing TCP connections|http://intrace.googlecode.com
|
||||
ircsnapshot|94.cb02a85|Tool to gather information from IRC servers.|https://github.com/bwall/ircsnapshot
|
||||
ivre|912.4ea2a72|Network recon framework.|https://ivre.rocks/
|
||||
ivre|954.2a7f74c|Network recon framework.|https://ivre.rocks/
|
||||
kacak|1.0|Tools for penetration testers that can enumerate which users logged on windows system.|https://github.com/galkan/kacak
|
||||
lanmap2|127.1197999|Passive network mapping tool.|http://github.com/rflynn/lanmap2
|
||||
lbd|20130719|Load Balancing detector|http://ge.mine.nu/code/lbd
|
||||
@ -56,11 +56,11 @@ recon-ng|4.8.0|A full-featured Web Reconnaissance framework written in Python.|h
|
||||
revipd|5.2aaacfb|A simple reverse IP domain scanner.|https://github.com/PypeRanger/revipd
|
||||
ripdc|0.2|A script which maps domains related to an given ip address or domainname.|http://nullsecurity.net/tools/scanner
|
||||
sctpscan|34.4d44706|A network scanner for discovery and security.|http://www.p1sec.com/
|
||||
simplyemail|456.c094a8f|Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com.|https://github.com/killswitch-GUI/SimplyEmail
|
||||
simplyemail|482.67fe027|Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com.|https://github.com/killswitch-GUI/SimplyEmail
|
||||
sipi|10.10f087f|Simple IP Information Tools for Reputation Data Analysis.|https://github.com/ST2Labs/SIPI
|
||||
smbcrunch|4.46267a3|3 tools that work together to simplify reconaissance of Windows File Shares.|https://github.com/Raikia/SMBCrunch
|
||||
smtp-user-enum|1.2|Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.|http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum
|
||||
sn1per|80.81324fe|Automated Pentest Recon Scanner.|https://github.com/1N3/Sn1per
|
||||
sn1per|83.f402b9a|Automated Pentest Recon Scanner.|https://github.com/1N3/Sn1per
|
||||
spiderfoot|2.6.1|The Open Source Footprinting Tool.|http://spiderfoot.net/
|
||||
ssl-hostname-resolver|1|CN (Common Name) grabber on X.509 Certificates over HTTPS.|http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html
|
||||
subdomainer|1.2|A tool designed for obtaining subdomain names from public sources.|http://www.edge-security.com/subdomainer.php
|
||||
@ -75,4 +75,4 @@ vbrute|1.11dda8b|Virtual hosts brute forcer.|https://github.com/nccgroup/vbrute
|
||||
waldo|28.a33de7a|A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.|https://github.com/red-team-labs/waldo
|
||||
websearch|1.cce2384|Search vhost names given a host range. Powered by Bing..|https://github.com/PentesterES/WebSearch
|
||||
whatweb|4188.f467aa2|Next generation web scanner that identifies what websites are running.|http://www.morningstarsecurity.com/research/whatweb
|
||||
zgrab|501.750e13a|Grab banners (optionally over TLS).|https://github.com/zmap/zgrab
|
||||
zgrab|511.7b65b58|Grab banners (optionally over TLS).|https://github.com/zmap/zgrab
|
||||
|
Reference in New Issue
Block a user