ElevenPaths / FOCA
Tool to find metadata and hidden information in the documents.
☆2,970Updated last year
Related projects ⓘ
Alternatives and complementary repositories for FOCA
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,057Updated last week
- The ultimate WinRM shell for hacking/pentesting☆4,527Updated 2 weeks ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,153Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆4,983Updated 3 weeks ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,440Updated last month
- Official Black Hat Arsenal Security Tools Repository☆3,901Updated 2 months ago
- A swiss army knife for pentesting networks☆8,448Updated 11 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,252Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,458Updated last month
- E-mails, subdomains and names Harvester - OSINT☆11,424Updated this week
- Metadata harvester☆1,027Updated 7 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆5,774Updated 5 months ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,083Updated this week
- Web application fuzzer☆5,957Updated 2 months ago
- Windows Exploit Suggester - Next Generation☆4,215Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,143Updated 7 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,000Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,449Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,733Updated 9 months ago
- Attack Surface Management Platform☆8,088Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,519Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,780Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,647Updated last month
- CeWL is a Custom Word List Generator☆1,988Updated 2 weeks ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,946Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆11,908Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,177Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,029Updated 4 years ago
- Directory/File, DNS and VHost busting tool written in Go☆10,071Updated this week