DataSploit / datasploitLinks
An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.
☆3,189Updated 3 weeks ago
Alternatives and similar repositories for datasploit
Users that are interested in datasploit are comparing it to the libraries listed below
Sorting:
- Metadata harvester☆1,189Updated last year
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,279Updated last year
- Reconnaissance Swiss Army Knife☆1,980Updated 4 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,776Updated this week
- Find exploits in local and online databases instantly☆1,783Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,179Updated last year
- https://t.me/i3visioo Solana Mev Bot using rust integrated flashloan, solana arbitrage bot trading flash loan grpc pumpfun shredstream f…☆1,132Updated last month
- Striker is an offensive information and vulnerability scanner.☆2,317Updated 2 years ago
- Phishing Campaign Toolkit☆2,489Updated 4 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,644Updated 5 years ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,213Updated last year
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,295Updated 6 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,274Updated 6 months ago
- Email recon made fast and easy, with a framework to build on☆954Updated 2 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,841Updated 2 years ago
- online port scan scraper☆1,118Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,075Updated this week
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,393Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,806Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,785Updated 2 months ago
- Network Infrastructure Penetration Testing Tool☆1,663Updated 4 years ago
- Command line utility for searching and downloading exploits☆1,791Updated 3 months ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,192Updated 3 years ago
- The most complete open-source tool for Twitter intelligence analysis☆1,954Updated 6 years ago
- Information gathering tool - OSINT☆1,359Updated 4 years ago
- Network Attack Tool☆1,489Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,379Updated 5 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,444Updated last year
- CLI tool for open source and threat intelligence☆1,250Updated 9 months ago
- Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetrat…☆1,411Updated 2 years ago