DataSploit / datasploit
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
☆3,078Updated 4 years ago
Alternatives and similar repositories for datasploit:
Users that are interested in datasploit are comparing it to the libraries listed below
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,231Updated 7 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,498Updated 2 weeks ago
- Metadata harvester☆1,079Updated 11 months ago
- Find exploits in local and online databases instantly☆1,696Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆3,988Updated 5 months ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,026Updated 3 weeks ago
- Striker is an offensive information and vulnerability scanner.☆2,252Updated last year
- Attack Surface Management Platform☆8,426Updated last month
- Reconnaissance Swiss Army Knife☆1,859Updated 4 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,141Updated 8 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,225Updated 4 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,163Updated 3 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,603Updated 3 months ago
- online port scan scraper☆1,116Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,320Updated last year
- E-mails, subdomains and names Harvester - OSINT☆12,042Updated last week
- Semi-automatic OSINT framework and package manager☆2,152Updated 2 weeks ago
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Phishing Campaign Toolkit☆2,331Updated 6 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,786Updated last year
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,410Updated 3 months ago
- Git All the Payloads! A collection of web attack payloads.☆3,677Updated last year
- Network Infrastructure Penetration Testing Tool☆1,631Updated 3 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,732Updated this week
- Know the dangers of credential reuse attacks.☆2,043Updated 4 months ago
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,650Updated 5 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,222Updated 10 months ago
- Maintained collection of OSINT related resources. (All Free & Actionable)☆2,058Updated 6 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,627Updated last week
- A Tool for Domain Flyovers☆5,714Updated 2 years ago