Dfte / DiscoveryLinks
Discovery will gather DNS entry, subdomains and domains linked, all files publicly exposed to gather metadatas, check for dumps on Pastebin/pwndb and create lists of emails for bruteforce phase !
☆13Updated 6 years ago
Alternatives and similar repositories for Discovery
Users that are interested in Discovery are comparing it to the libraries listed below
Sorting:
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 3 years ago
- convert SQL dumps and other leaked db dump formats to CSV☆51Updated last year
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- Fully-featured spear-phishing toolkit - web front-end☆52Updated 6 months ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Monitor areas on static map services & log new images☆23Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Facebook OSINT Collection and Analysis Tool☆52Updated 5 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 11 months ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆64Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Linkedin Employee Profile Scrapper☆67Updated last year
- 🧬 Extract and analyze contributors info from git repos☆84Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆76Updated 2 years ago
- A simple proof of concept that demonstrate how emails can easily be tie to LinkedIn profile☆44Updated 3 years ago
- Fraud prevention tool☆28Updated 4 years ago
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆50Updated 5 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago