Betawolf / social-vuln-scannerLinks
Gathers public information on companies to highlight social engineering risk.
☆30Updated 9 years ago
Alternatives and similar repositories for social-vuln-scanner
Users that are interested in social-vuln-scanner are comparing it to the libraries listed below
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- ☆47Updated 9 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- A few SQL and XSS attack tools☆40Updated 5 years ago
- Multi source CVE/exploit parser.☆28Updated 7 years ago
- scythe: account enumerator☆61Updated 12 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Arp spoof detection tool☆24Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- ☆22Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 4 years ago
- ☆46Updated 7 years ago
- Some works on Nmap Scripts (NSE)☆87Updated last year
- Active/passive network scanner and autonomous vulnerability assessment application.☆76Updated 5 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 5 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆83Updated 7 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago