OSINT tool for testing privacy and social engineering vulnerability of organizations.
☆94Jul 1, 2019Updated 6 years ago
Alternatives and similar repositories for cignotrack
Users that are interested in cignotrack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Whatsapp forensics and profiler tool - Useful for digital forensics and social media intelligence (SOCMINT)☆14Jun 18, 2019Updated 6 years ago
- OSINT - SOCMINT (social media intelligence) Twitter hashtag analyzer☆20Apr 8, 2019Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Mar 13, 2021Updated 5 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- ☆17Mar 21, 2019Updated 7 years ago
- Probe_Spider is a Open Source Intelligence Tool made complete out of Python.☆27Apr 28, 2020Updated 5 years ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 4 months ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 7 years ago
- An Amazon OSINT scraper for potential scam accounts☆33Jan 17, 2019Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Nov 30, 2017Updated 8 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- ☆15Jul 7, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆154Oct 20, 2018Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Data analysis and OSINT framework for Twitter☆414Oct 18, 2020Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆249Nov 11, 2020Updated 5 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year