OneforallOneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+13906.67%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+373.33%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+5140%)
gosintGosint is a distributed asset information collection and vulnerability scanning platform
Stars: ✭ 344 (+1046.67%)
ICP-CheckerICP备案查询,可查询企业或域名的ICP备案信息,自动完成滑动验证,保存结果到Excel表格,适用于2022年新版的工信部备案管理系统网站,告别频繁拖动验证,以及某站*工具要开通VIP才可查看备案信息的坑
Stars: ✭ 119 (+296.67%)
Anubis🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+2306.67%)
lazyGrandmaa shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves
Stars: ✭ 49 (+63.33%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+413.33%)
Sub-DrillA very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+133.33%)
SudomySudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+2763.33%)
PassivehunterSubdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (+176.67%)
SubcertSubcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Stars: ✭ 58 (+93.33%)
RenginereNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+11363.33%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+11203.33%)
Th3inspectorTh3Inspector 🕵️ Best Tool For Information Gathering 🔎
Stars: ✭ 1,041 (+3370%)
TheharvesterE-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+20483.33%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1313.33%)
SubdomainizerA tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+2950%)
PdlistA passive subdomain finder
Stars: ✭ 204 (+580%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+286.67%)
Red hawkAll in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 1,898 (+6226.67%)
SubWalkerSimultaneously execute various subdomain enumeration tools and aggregate results.
Stars: ✭ 26 (-13.33%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+96.67%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+29836.67%)
FavfreakMaking Favicon.ico based Recon Great again !
Stars: ✭ 564 (+1780%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (+10%)
facebook totemTotem allows you to retrieve information about ads of a facebook page , we can retrieve the number of people targeted, how much the ad cost and a lot of other information.
Stars: ✭ 51 (+70%)
NightingaleIt's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (+296.67%)
ReverseIPRuby based reverse IP-lookup tool.
Stars: ✭ 44 (+46.67%)
centCommunity edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place
Stars: ✭ 315 (+950%)
AstraAstra is a tool to find URLs and secrets inside a webpage/files
Stars: ✭ 187 (+523.33%)
SQLi-Query-TamperingSQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite's Intruder. This extension gives you the flexibility of manual testing with many powerful evasion techniques.
Stars: ✭ 123 (+310%)
Mr.Holmes🔍 A Complete Osint Tool
Stars: ✭ 307 (+923.33%)
requests-ip-rotatorA Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (+976.67%)
Jasmin-RansomwareJasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+180%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (+53.33%)
ad-privileged-auditProvides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+40%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (+6.67%)
asnapasnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-6.67%)
gf-patternsCollection grep patterns for Tom Hudson a.k.a Tomnomnom tools namely gf
Stars: ✭ 27 (-10%)
quick-scriptsA collection of my quick and dirty scripts for vulnerability POC and detections
Stars: ✭ 73 (+143.33%)
nozakiHTTP fuzzer engine security oriented
Stars: ✭ 37 (+23.33%)
bug-bountyMy personal bug bounty toolkit.
Stars: ✭ 127 (+323.33%)
CC33ZCurso de Ciência da Computação
Stars: ✭ 50 (+66.67%)
E4GL30S1NTE4GL30S1NT - Simple Information Gathering Tool
Stars: ✭ 139 (+363.33%)
vapivAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.
Stars: ✭ 674 (+2146.67%)
ldap2jsonThe ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.
Stars: ✭ 56 (+86.67%)
PinaakA vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (+130%)
IP-TrackerTrack any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (+76.67%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+210%)
shaniaScan secrets from Continuous Integration Build Logs
Stars: ✭ 54 (+80%)
chrome extensionBrowser extension that uses intelligence to combat malicious websites by blocking them in real-time.
Stars: ✭ 53 (+76.67%)
IStego100KIStego100K: Large-scale Image Steganalysis Dataset
Stars: ✭ 42 (+40%)
DeadDNSDNS hijacking via dead records automation tool
Stars: ✭ 44 (+46.67%)