External recon toolkit
☆55Dec 29, 2024Updated last year
Alternatives and similar repositories for go-recon
Users that are interested in go-recon are comparing it to the libraries listed below
Sorting:
- ☆23Mar 22, 2025Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated last week
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆19Apr 6, 2024Updated last year
- Extracts URLs from OSINT Archives for Security Insights☆177Mar 14, 2026Updated last week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Nuclei templates to run on urls☆17Sep 14, 2023Updated 2 years ago
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆247Feb 3, 2026Updated last month
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆404Dec 20, 2025Updated 3 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 4 months ago
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 7 months ago
- one-for-all llm powered, passive & active subdomain enumeration tool☆106Nov 27, 2025Updated 3 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆163Nov 28, 2024Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Finding XSS during recon☆272Sep 13, 2022Updated 3 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- 免杀☆12May 6, 2024Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- Demonstrating ICMP, SYN, Xmas flood attacks to analyze results.☆12Mar 13, 2021Updated 5 years ago
- ☆13Jun 28, 2023Updated 2 years ago
- CVE-2025-1974☆90Apr 2, 2025Updated 11 months ago
- kill windows log☆45Mar 26, 2024Updated last year
- AI web vulneraribilty scanner 🤖☆20Feb 22, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 9 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 9 months ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 2 months ago