DataSploit / datasploitLinks
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
☆3,135Updated 5 years ago
Alternatives and similar repositories for datasploit
Users that are interested in datasploit are comparing it to the libraries listed below
Sorting:
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,261Updated 11 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,683Updated last week
- Metadata harvester☆1,120Updated last year
- Reconnaissance Swiss Army Knife☆1,923Updated 4 years ago
- Find exploits in local and online databases instantly☆1,740Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,091Updated 10 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,351Updated 8 months ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆990Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,292Updated 2 years ago
- Email recon made fast and easy, with a framework to build on☆958Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,778Updated last year
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,772Updated 8 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,342Updated 9 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,671Updated 7 months ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,363Updated 5 years ago
- Know the dangers of credential reuse attacks.☆2,056Updated 8 months ago
- Attack Surface Management Platform☆8,844Updated last month
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,744Updated 5 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,512Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,752Updated last month
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,205Updated 3 weeks ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,213Updated 6 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,704Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆12,959Updated this week
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,308Updated 8 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,713Updated 8 months ago
- Information gathering tool - OSINT☆1,314Updated 4 years ago
- Phishing Campaign Toolkit☆2,410Updated 11 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- List of Awesome Asset Discovery Resources☆2,160Updated 5 months ago