☆11Jun 5, 2022Updated 3 years ago
Alternatives and similar repositories for Automated-Reconator
Users that are interested in Automated-Reconator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago
- Advanced MITM Tool☆13Jul 27, 2025Updated 7 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 3 months ago
- EZ deployment of a fully featured Kubernetes on your machine with Vagrant☆22Sep 23, 2025Updated 6 months ago
- Python Packages For Ethical Hacking☆17Apr 20, 2023Updated 2 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- Portfolio Zidane Bouabsa |Platform Engineer | SRE | Kubernetes Expert☆55Dec 21, 2025Updated 3 months ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆42Jun 19, 2022Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Lists various tools used in hardware hacking.☆33Jan 25, 2026Updated last month
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- A GUI based face recognizer coded in Python☆12Dec 19, 2019Updated 6 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- The C4 Concurrent C Fuzzer☆14Nov 2, 2023Updated 2 years ago
- Simple Unity ECS framework that supports all the basics of an RPG☆13Jun 23, 2020Updated 5 years ago
- ☆13Dec 4, 2023Updated 2 years ago
- A tool designed to analyse email headers☆40Oct 4, 2022Updated 3 years ago
- ☆10Jul 29, 2022Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Sep 13, 2021Updated 4 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Android Toasts -- Simple user feedback about background operations☆14Oct 7, 2013Updated 12 years ago
- A curated list of audit rules which extract from Source Code Auditing tools.☆15Feb 19, 2020Updated 6 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- A small library that makes it easy to add RPG-Style leveling up to any game, mod, or project☆11Dec 9, 2021Updated 4 years ago
- My home server infrastructure as code☆16Updated this week
- ☆16May 3, 2021Updated 4 years ago
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- A lightweight, python implementation of onion routing used by tor. This is a proof of concept where the user enters a web url on the comm…☆12Dec 26, 2022Updated 3 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 10 months ago
- Exploring different process injection techniques based on malware analysis☆14Dec 28, 2023Updated 2 years ago