Betawolf / social-vuln-scanner
Gathers public information on companies to highlight social engineering risk.
☆27Updated 8 years ago
Related projects: ⓘ
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆30Updated 12 years ago
- Determine everything you need to know to about a system☆30Updated 6 years ago
- Passive recon / OSINT automation script☆40Updated 5 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆59Updated last week
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 5 years ago
- recon-ng Maltego local transform pack☆37Updated 10 years ago
- Unofficial WhatCMS API package☆43Updated 3 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 2 years ago
- scythe: account enumerator☆60Updated 11 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆94Updated last year
- ☆18Updated this week
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 6 years ago
- ☆62Updated 8 years ago
- ☆51Updated this week
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- Intelligent threat hunter and phishing servers☆46Updated 5 years ago
- A collection of Nmap NSE scripts that I made.☆26Updated 11 years ago
- ☆47Updated 8 years ago
- ☆31Updated this week
- ☆46Updated 6 years ago
- ☆53Updated this week
- Simple Webshell Scanner☆49Updated 9 years ago
- Subdomain brute force focused on speed and data serialization☆73Updated last year
- ☆60Updated this week