C3n7ral051nt4g3ncy / SocialPwned
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB or Dehashed and obtain Google account information via GHunt.
☆11Updated 2 years ago
Alternatives and similar repositories for SocialPwned
Users that are interested in SocialPwned are comparing it to the libraries listed below
Sorting:
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆10Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- In this repository, I will collect quick and simple code examples that use Python to automate various #osint tasks.☆57Updated last year
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Terminal based fake identity generator.☆26Updated last year
- ☆17Updated 2 years ago
- ☆9Updated 3 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Updated last year
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆19Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 6 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- This is a guide to understand Flag categories for Trace Labs OSINT Search Party CTF events☆29Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- redteaming a simple language model like gpt2. based on anthropic redteaming paper☆8Updated 2 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Rockyou for web fuzzing☆14Updated 3 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Updated 2 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Updated last year
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- ☆23Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆45Updated last year
- List of OSINT resources☆15Updated 4 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago