DataSploit / datasploitLinks
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
☆3,196Updated last month
Alternatives and similar repositories for datasploit
Users that are interested in datasploit are comparing it to the libraries listed below
Sorting:
- Metadata harvester☆1,201Updated last year
- Reconnaissance Swiss Army Knife☆1,980Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,279Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,788Updated this week
- Find exploits in local and online databases instantly☆1,791Updated 4 years ago
- Phishing Campaign Toolkit☆2,493Updated 5 months ago
- Striker is an offensive information and vulnerability scanner.☆2,314Updated 2 years ago
- https://t.me/i3visioo Solana Mev Bot Solana Mev Bot Solana Mev Bot Solana Mev Bot Solana Mev Bot Solana Mev Bot Solana Mev Bot Solana Mev…☆1,162Updated 2 weeks ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,282Updated 6 months ago
- Network Infrastructure Penetration Testing Tool☆1,664Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,196Updated last year
- OSINT python webscaping framework☆1,120Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,082Updated 3 weeks ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,377Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,644Updated 5 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,296Updated 7 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,809Updated last year
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,846Updated 2 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,391Updated last year
- CLI tool for open source and threat intelligence☆1,250Updated 10 months ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,253Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,344Updated this week
- Information gathering tool - OSINT☆1,367Updated 4 years ago
- Command line utility for searching and downloading exploits☆1,796Updated 3 months ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,472Updated 4 months ago
- online port scan scraper☆1,118Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …