sherlock🔎 Find usernames across social networks
Stars: ✭ 52 (+15.56%)
Tidos FrameworkThe Offensive Manual Web Application Penetration Testing Framework.
Stars: ✭ 1,290 (+2766.67%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (+275.56%)
OpenctiAuthors
Stars: ✭ 2,165 (+4711.11%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+795.56%)
PhoneinfogaPhoneInfoga is one of the most advanced tools to scan international phone numbers using only free resources. It allows you to first gather standard information such as country, area, carrier and line type on any international phone number. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.
Stars: ✭ 5,927 (+13071.11%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (+73.33%)
Osint SanFramework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (+120%)
Moriarty ProjectThis tool gives information about the phone number that you entered.
Stars: ✭ 223 (+395.56%)
InfogaInfoga - Email OSINT
Stars: ✭ 947 (+2004.44%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+400%)
facebook totemTotem allows you to retrieve information about ads of a facebook page , we can retrieve the number of people targeted, how much the ad cost and a lot of other information.
Stars: ✭ 51 (+13.33%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+2142.22%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+15953.33%)
ShonyDanzaA customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+91.11%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+17126.67%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-26.67%)
PdlistA passive subdomain finder
Stars: ✭ 204 (+353.33%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+1153.33%)
PrismaticaResponsive Command and Control System
Stars: ✭ 81 (+80%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+173.33%)
IRIS🔍 IRIS: An open-source intelligence framework
Stars: ✭ 79 (+75.56%)
OtsecaOpen source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
Stars: ✭ 416 (+824.44%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+0%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+13622.22%)
DeadtrapAn OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (+62.22%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-24.44%)
osint-combinerCombining OSINT sources in Elastic Stack
Stars: ✭ 77 (+71.11%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+455.56%)
osintDocker image for osint
Stars: ✭ 92 (+104.44%)
InstaloaderDownload pictures (or videos) along with their captions and other metadata from Instagram.
Stars: ✭ 3,655 (+8022.22%)
I See YouISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+446.67%)
AsnASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation and geolocation lookup tool / Traceroute server
Stars: ✭ 242 (+437.78%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-60%)
frisbeeCollect email addresses by crawling search engine results.
Stars: ✭ 29 (-35.56%)
OmnibusThe OSINT Omnibus (beta release)
Stars: ✭ 243 (+440%)
Recon-XAdvanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-40%)
MihariA helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (+431.11%)
ZKShSSearch shodan without any knowledge about its queries
Stars: ✭ 37 (-17.78%)
LeakscraperLeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Stars: ✭ 227 (+404.44%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+9788.89%)
MaigretOSINT username checker. Collect a dossier on a person by username from a huge number of sites.
Stars: ✭ 219 (+386.67%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-71.11%)
pywhatcmsUnofficial WhatCMS API package
Stars: ✭ 42 (-6.67%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+182.22%)
DarkscrapeOSINT Tool For Scraping Dark Websites
Stars: ✭ 224 (+397.78%)
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+393.33%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+31.11%)
CrosslinkedLinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping
Stars: ✭ 223 (+395.56%)
SitedorksSearch Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (+391.11%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-57.78%)