Betawolf / social-vuln-scannerLinks
Gathers public information on companies to highlight social engineering risk.
☆30Updated 9 years ago
Alternatives and similar repositories for social-vuln-scanner
Users that are interested in social-vuln-scanner are comparing it to the libraries listed below
Sorting:
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Arp spoof detection tool☆25Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Multi source CVE/exploit parser.☆28Updated 8 years ago
- Simple Webshell Scanner☆51Updated 10 years ago
- scythe: account enumerator☆61Updated 12 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- ☆46Updated 7 years ago
- Social Engineering Toys☆36Updated 9 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆51Updated 4 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- ☆47Updated 9 years ago
- Some of my Nmap scripts☆22Updated 8 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 4 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Nmap NSE scripts☆28Updated 3 years ago
- ☆22Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago