Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
☆499Jan 31, 2026Updated last month
Alternatives and similar repositories for ghost_eye
Users that are interested in ghost_eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆186Jan 31, 2026Updated last month
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆40Jan 8, 2022Updated 4 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,119Jan 31, 2026Updated last month
- Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily fin…☆829Jan 31, 2026Updated last month
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆56Feb 28, 2025Updated last year
- "Happy Birthday Python" script.☆20Nov 29, 2019Updated 6 years ago
- Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Googl…☆1,748Jan 31, 2026Updated last month
- Welcome to DarkWebEye Explore the unseen depths of the internet with DarkWebEye, a powerful and intuitive tool crafted by Jolanda de Koff…☆53Jan 31, 2026Updated last month
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Jan 31, 2026Updated last month
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,621Sep 26, 2023Updated 2 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,580Apr 21, 2025Updated 11 months ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 7 months ago
- ☆25Mar 21, 2020Updated 6 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆440Apr 26, 2022Updated 3 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆140Oct 3, 2023Updated 2 years ago
- Albanian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user di…☆1,408Dec 24, 2024Updated last year
- Tool Information Gathering Write By Python.☆742Apr 27, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Android penetration testing tool for Kali linux☆16Jul 16, 2018Updated 7 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆17Sep 14, 2020Updated 5 years ago
- All In One Web Recon☆2,672Apr 30, 2025Updated 10 months ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Feb 25, 2022Updated 4 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- All-languages fork bombs☆14Jan 2, 2022Updated 4 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,570Jul 31, 2024Updated last year
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆64May 2, 2020Updated 5 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It …☆2,091Jun 7, 2023Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,298Nov 1, 2025Updated 4 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago