Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3. To run Ghost Eye, it only needs a domain or ip. Ghost Eye can work with any Linux distros if they support Python 3. Author: Jolanda de Koff
☆502Apr 1, 2026Updated last week
Alternatives and similar repositories for ghost_eye
Users that are interested in ghost_eye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆189Apr 1, 2026Updated last week
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆40Jan 8, 2022Updated 4 years ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆1,124Apr 1, 2026Updated last week
- Dorks Eye Google Hacking Dork Scraping and Searching Script. Dorks Eye is a script I made in python 3. With this tool, you can easily fin…☆834Apr 1, 2026Updated last week
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆56Feb 28, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- "Happy Birthday Python" script.☆20Nov 29, 2019Updated 6 years ago
- Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Googl…☆1,773Apr 1, 2026Updated last week
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆36Updated this week
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,646Sep 26, 2023Updated 2 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,602Apr 21, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- ☆25Mar 21, 2020Updated 6 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆443Apr 26, 2022Updated 3 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆142Oct 3, 2023Updated 2 years ago
- Tool Information Gathering Write By Python.☆743Apr 27, 2023Updated 2 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Android penetration testing tool for Kali linux☆16Jul 16, 2018Updated 7 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆17Sep 14, 2020Updated 5 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆25Feb 25, 2022Updated 4 years ago
- All In One Web Recon☆2,685Apr 30, 2025Updated 11 months ago
- ☆12Aug 21, 2020Updated 5 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,577Jul 31, 2024Updated last year
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsib…☆63May 2, 2020Updated 5 years ago
- Web Recon & Exploitation Tool.☆56Mar 8, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It …☆2,095Jun 7, 2023Updated 2 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.☆3,311Nov 1, 2025Updated 5 months ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago