All Projects → phomber → Similar Projects or Alternatives

945 Open source projects that are alternatives of or similar to phomber

AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-23.73%)
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+161.02%)
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+3818.64%)
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+5647.46%)
Aliens eye
Social media hunter
Stars: ✭ 105 (+77.97%)
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-13.56%)
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+618.64%)
netizenship
a commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-44.07%)
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+96.61%)
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+11564.41%)
Gitmonitor
One way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (+94.92%)
Mutual labels:  cybersecurity, reconnaissance
trj
Execute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (-64.41%)
Mutual labels:  cybersecurity, hacking-tool
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (+64.41%)
Mutual labels:  cybersecurity, hacking-tool
Openuba
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Stars: ✭ 127 (+115.25%)
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (+152.54%)
Mutual labels:  cybersecurity, hacker
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+4561.02%)
Mutual labels:  cybersecurity, hacker
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+327.12%)
Mutual labels:  cybersecurity, reconnaissance
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-20.34%)
Mutual labels:  cybersecurity, hacking-tool
Investigo
🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (+184.75%)
evildork
Evildork targeting your fiancee👁️
Stars: ✭ 46 (-22.03%)
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+140.68%)
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+362.71%)
Mutual labels:  cybersecurity, reconnaissance
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-49.15%)
Mutual labels:  cybersecurity, hacker
Hack4Squad
💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-23.73%)
UserFinder
OSINT tool for finding profiles by username
Stars: ✭ 379 (+542.37%)
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+27.12%)
Mutual labels:  cybersecurity, hacking-tool
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+17613.56%)
Mutual labels:  cybersecurity, hacker
Content
Security automation content in SCAP, OSCAL, Bash, Ansible, and other formats
Stars: ✭ 1,219 (+1966.1%)
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (+67.8%)
Mutual labels:  cybersecurity, hacker
Certeagle
Weaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (+32.2%)
Mutual labels:  cybersecurity, reconnaissance
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+145.76%)
Mutual labels:  cybersecurity, reconnaissance
Wireshark Cheatsheet
Wireshark Cheat Sheet
Stars: ✭ 131 (+122.03%)
VirusX5
The Most Powerful Fake Page Redirecting tool...
Stars: ✭ 15 (-74.58%)
sherlock
🔎 Find usernames across social networks
Stars: ✭ 52 (-11.86%)
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-28.81%)
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+50.85%)
Mutual labels:  cybersecurity, hacking-tool
Recon-X
Advanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-54.24%)
wordlist generator
Unique wordlist generator of unique wordlists.
Stars: ✭ 41 (-30.51%)
gosint
Gosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+483.05%)
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+401.69%)
Mutual labels:  cybersecurity, reconnaissance
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+54.24%)
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+1047.46%)
Mutual labels:  cybersecurity, hacking-tool
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+411.86%)
Mutual labels:  cybersecurity, hacking-tool
vimana-framework
Vimana is an experimental security framework that aims to provide resources for auditing Python web applications.
Stars: ✭ 47 (-20.34%)
IP-Tracker
Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (-10.17%)
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+84.75%)
Mutual labels:  hacking-tool, reconnaissance
ObsidianSailboat
Nmap and NSE command line wrapper in the style of Metasploit
Stars: ✭ 36 (-38.98%)
ICP-Checker
ICP备案查询,可查询企业或域名的ICP备案信息,自动完成滑动验证,保存结果到Excel表格,适用于2022年新版的工信部备案管理系统网站,告别频繁拖动验证,以及某站*工具要开通VIP才可查看备案信息的坑
Stars: ✭ 119 (+101.69%)
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-57.63%)
Mutual labels:  cybersecurity, reconnaissance
querytool
Querytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
Stars: ✭ 104 (+76.27%)
urlRecon
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Stars: ✭ 31 (-47.46%)
Mutual labels:  cybersecurity, reconnaissance
auto-recon-ng
Automated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-71.19%)
SCANNER-INURLBR
Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Stars: ✭ 90 (+52.54%)
Mutual labels:  cybersecurity, hacking-tool
incident-response-plan-template
A concise, directive, specific, flexible, and free incident response plan template
Stars: ✭ 288 (+388.14%)
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-50.85%)
Mutual labels:  cybersecurity, hacking-tool
anubis
Captive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-22.03%)
lazyGrandma
a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves
Stars: ✭ 49 (-16.95%)
recce
Domain availbility checker
Stars: ✭ 30 (-49.15%)
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+816.95%)
Mutual labels:  cybersecurity, reconnaissance
Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Stars: ✭ 604 (+923.73%)
Mutual labels:  cybersecurity, hacking-tool
1-60 of 945 similar projects