Tlosint LiveTrace Labs OSINT Linux Distribution based on Kali.
Stars: ✭ 151 (-30.09%)
Security TxtA proposed standard that allows websites to define security policies.
Stars: ✭ 1,393 (+544.91%)
Pagodopagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
Stars: ✭ 603 (+179.17%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-52.31%)
Nuclei TemplatesCommunity curated list of templates for the nuclei engine to find security vulnerabilities.
Stars: ✭ 1,354 (+526.85%)
XspearPowerfull XSS Scanning and Parameter analysis tool&gem
Stars: ✭ 583 (+169.91%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-68.06%)
GitrobReconnaissance tool for GitHub organizations
Stars: ✭ 5,256 (+2333.33%)
ArlARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Stars: ✭ 1,357 (+528.24%)
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-39.35%)
Mongoaudit🔥 A powerful MongoDB auditing and pentesting tool 🔥
Stars: ✭ 1,174 (+443.52%)
Amitt frameworkRepo replaced by cogsec-collaborative/AMITT
Stars: ✭ 152 (-29.63%)
Passphrase WordlistPassphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (+157.41%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (-54.17%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+2758.8%)
XrcrossXRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
Stars: ✭ 175 (-18.98%)
RedcloudAutomated Red Team Infrastructure deployement using Docker
Stars: ✭ 551 (+155.09%)
GrawlerGrawler is a tool written in PHP which comes with a web interface that automates the task of using google dorks, scrapes the results, and stores them in a file.
Stars: ✭ 98 (-54.63%)
Sherlock🔎 Hunt down social media accounts by username across social networks
Stars: ✭ 28,569 (+13126.39%)
Ssti Payloads🎯 Server Side Template Injection Payloads
Stars: ✭ 150 (-30.56%)
SocialscanPython library and CLI for accurately querying username and email usage on online platforms
Stars: ✭ 538 (+149.07%)
HowtohuntTutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+1287.04%)
Tools TbhmTools of "The Bug Hunters Methodology V2 by @jhaddix"
Stars: ✭ 171 (-20.83%)
FindsploitFind exploits in local and online databases instantly
Stars: ✭ 1,160 (+437.04%)
Infosec getting startedA collection of resources/documentation/links/etc to help people learn about Infosec and break into the field.
Stars: ✭ 526 (+143.52%)
Red Team Curation ListA list to discover work of red team tooling and methodology for penetration testing and security assessment
Stars: ✭ 68 (-68.52%)
Userrecon PyUsername recognition on various websites.
Stars: ✭ 131 (-39.35%)
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+425.93%)
Linkedin2usernameOSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (+133.33%)
DotDarknet OSINT Transform
Stars: ✭ 93 (-56.94%)
MitakaA browser extension for OSINT search
Stars: ✭ 483 (+123.61%)
OdinAutomated network asset, email, and social media profile discovery and cataloguing.
Stars: ✭ 476 (+120.37%)
DogeDarknet Osint Graph Explorer
Stars: ✭ 93 (-56.94%)
Search That Hash🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (+115.74%)
HawkeyeHawkeye filesystem analysis tool
Stars: ✭ 202 (-6.48%)
PlumhoundBloodhound for Blue and Purple Teams
Stars: ✭ 452 (+109.26%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+509.26%)
Dradis CeDradis Framework: Colllaboration and reporting for IT Security teams
Stars: ✭ 443 (+105.09%)
MyriamA vulnerable iOS App with Security Challenges for the Security Researcher inside you.
Stars: ✭ 146 (-32.41%)
FfufFast web fuzzer written in Go
Stars: ✭ 5,687 (+2532.87%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-57.87%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+103.24%)
CardpwnOSINT Tool to find Breached Credit Cards Information
Stars: ✭ 187 (-13.43%)
SmogcloudFind cloud assets that no one wants exposed 🔎 ☁️
Stars: ✭ 168 (-22.22%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-39.35%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-70.83%)
MimirSmart OSINT collection of common IOC types
Stars: ✭ 63 (-70.83%)
ReconnessReconNess is a platform to allow continuous recon (CR) where you can set up a pipeline of #recon tools (Agents) and trigger it base on schedule or events.
Stars: ✭ 131 (-39.35%)
MobilehackersweaponsMobile Hacker's Weapons / A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting
Stars: ✭ 170 (-21.3%)
H8mailEmail OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+901.39%)
S3reverseThe format of various s3 buckets is convert in one format. for bugbounty and security testing.
Stars: ✭ 61 (-71.76%)