External recon toolkit
☆54Dec 29, 2024Updated last year
Alternatives and similar repositories for go-recon
Users that are interested in go-recon are comparing it to the libraries listed below
Sorting:
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 9 months ago
- ☆23Mar 22, 2025Updated 11 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- 免杀☆12May 6, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆246Feb 3, 2026Updated 3 weeks ago
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆405Dec 20, 2025Updated 2 months ago
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- woodpecker 漏洞插件开发的简单示范,用于插件的快速上手☆27May 4, 2021Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Asynchronous Java SS7 Stack and Services with Clustered Support☆14Oct 23, 2025Updated 4 months ago
- ☆16Oct 18, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 weeks ago
- Demonstrating ICMP, SYN, Xmas flood attacks to analyze results.☆12Mar 13, 2021Updated 4 years ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆93Nov 13, 2025Updated 3 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- ☆12Jun 28, 2023Updated 2 years ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆20Apr 24, 2025Updated 10 months ago
- Tool to mass scan hikvision cameras and save vulnrable devices, use snapshot.py to save live snapshots☆16Jan 20, 2022Updated 4 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- Extracts URLs from OSINT Archives for Security Insights☆176Updated this week
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Jun 23, 2025Updated 8 months ago
- Nuclei templates to run on urls☆17Sep 14, 2023Updated 2 years ago
- A Lightning-Fast DNS Resolver written in Rust 🦀☆69Nov 19, 2024Updated last year
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- A powerful Burp Suite extension that imports Postman collections☆30Aug 1, 2025Updated 7 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated last year
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆131May 12, 2025Updated 9 months ago