Git Product home page Git Product logo

5l1v3r1's Projects

whoc icon whoc

A container image that extracts the underlying container runtime

whodat icon whodat

Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)

whodis icon whodis

An example pattern in C# for watching security events (logon/logoff/privilege)

whodis-1 icon whodis-1

Simple Text & Email Spoofer/Email ✉️ 📱 Only supported by gmail for NOW Prerequisites: python3 import yagmail Email Account (of course) EDUCATION PURPOSES ONLY! Configuration: 1. Open the WhoDis.py file in any text editor 2. Under “CREDENTIALS” enter your gmail name and password. 3. Save the file and you’re off to go! ** SMTP Authentication error ** If this appears when running, try these solutions; 1. Make sure the credentials provided are correct 2. Login to gmail using a web browser (then rerun program) 3. Make sure your gmail account has third party apps enabled (found in security settings).

whohackedme icon whohackedme

:mag: Instantly search the web for hacked data. Check if you appear in any database leaks.

whois icon whois

Whois Online Domain Database for check domains are reserved or not as parallel

whois-1 icon whois-1

An intelligent — pure Ruby — WHOIS client and parser.

whoishere.py icon whoishere.py

WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.

whoisleak icon whoisleak

This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.

whoislikeaboss icon whoislikeaboss

whoislikeaboss is a tool that takes the IP addresses given in a file (one per line), and will give you the range and owner of each of the addresses (with duplicates removed) so you can spot anything that looks fishy before you start testing

whoistory icon whoistory

Maltego Local Transforms for RIPE Historical WHOIS records

wholeaked icon wholeaked

a file-sharing tool that allows you to find the responsible person in case of a leakage

whonix icon whonix

Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org

whonow icon whonow

A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)

whoosh icon whoosh

Whoosh is a fast, featureful full-text indexing and searching library implemented in pure Python.

whorange icon whorange

Discover network IP range by sending ARP whohas to various subnets/ips

whowasi icon whowasi

Impersonate Logged In Accounts & Execute Commands

whoxyrm icon whoxyrm

A reverse whois tool based on Whoxy API.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.