mec-ngpentest toolbox
Stars: ✭ 28 (-83.91%)
mmhdanCalculate fingerprints of a website for OSINT search
Stars: ✭ 35 (-79.89%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-83.33%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-78.16%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (+12.07%)
telescanNo description or website provided.
Stars: ✭ 120 (-31.03%)
Search4Search people on the Internet.
Stars: ✭ 151 (-13.22%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-74.14%)
dorkscoutDorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
Stars: ✭ 189 (+8.62%)
OSINTBookmarksOSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (-80.46%)
ArgosThis script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (-58.05%)
Web-IotaIota is a web scraper which can find all of the images and links/suburls on a webpage
Stars: ✭ 60 (-65.52%)
graphw00fgraphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (+49.43%)
o365chkSimple Python tool to check if there is an Office 365 instance linked to a domain.
Stars: ✭ 37 (-78.74%)
AntiEye:.IP webcam penetration test suit.:
Stars: ✭ 21 (-87.93%)
boxerBoxer: A fast directory bruteforce tool written in Python with concurrency.
Stars: ✭ 15 (-91.38%)
ivreNetwork recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+1458.62%)
reverieAutomated Pentest Tools Designed For Parrot Linux
Stars: ✭ 77 (-55.75%)
emailGuesserThis is an open source project which helps users "guess" their target's email address based on multiple inputs and preferences.
Stars: ✭ 52 (-70.11%)
brutekragPenetration tests on SSH servers using brute force or dictionary attacks. Written in Python.
Stars: ✭ 30 (-82.76%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (-21.26%)
findcdnfindCDN is a tool created to help accurately identify what CDN a domain is using.
Stars: ✭ 64 (-63.22%)
tracerTAutomated Google dorking with custom search engines
Stars: ✭ 26 (-85.06%)
ravenRaven is a Web application penetration testing tool.
Stars: ✭ 19 (-89.08%)
vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+68.97%)
pentest-reportsCollection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (-36.21%)
cdCloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross-site scripting and other exploitable vulnerabilities.
Stars: ✭ 33 (-81.03%)
DNSExplorerBash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-81.03%)
osintDocker image for osint
Stars: ✭ 92 (-47.13%)
toutatisToutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more
Stars: ✭ 803 (+361.49%)
xecaPowerShell payload generator
Stars: ✭ 103 (-40.8%)
Investigo🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (-3.45%)
Dark-PhishDark-Phish is a complete phishing tool. For more about Dark-Phish tool please visit the website.
Stars: ✭ 57 (-67.24%)
Leakfa.comA simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (-39.08%)
XposedOrNotXposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Stars: ✭ 120 (-31.03%)
lavaMicrosoft Azure Exploitation Framework
Stars: ✭ 46 (-73.56%)
goLazagneGo library for credentials recovery
Stars: ✭ 177 (+1.72%)
filter-var-sqliBypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )
Stars: ✭ 29 (-83.33%)
Aliens eyeSocial media hunter
Stars: ✭ 105 (-39.66%)
sprysocial media intelligence from the command line
Stars: ✭ 40 (-77.01%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-75.86%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-70.69%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+143.68%)
gHarvesterProof of concept for a security issue (in my opinion) that I found in accounts.google.com
Stars: ✭ 20 (-88.51%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-19.54%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-86.78%)
numspyA python module for sending free sms as well as finding details of mobile number via website Way2sms.
Stars: ✭ 57 (-67.24%)
ShogunShodan.io Command Line Interface
Stars: ✭ 42 (-75.86%)
clairvoyanceObtain GraphQL API Schema even if the introspection is not enabled
Stars: ✭ 448 (+157.47%)
NtlmreconEnumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+44.83%)
Cc.pyExtracting URLs of a specific target based on the results of "commoncrawl.org"
Stars: ✭ 250 (+43.68%)