ElevenPaths / FOCA
Tool to find metadata and hidden information in the documents.
☆2,987Updated last year
Related projects ⓘ
Alternatives and complementary repositories for FOCA
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,107Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,003Updated last month
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,168Updated 2 months ago
- Metadata harvester☆1,032Updated 8 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,737Updated 9 months ago
- CeWL is a Custom Word List Generator☆2,001Updated 3 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆11,495Updated this week
- All In One Web Recon☆2,295Updated 2 weeks ago
- The ultimate WinRM shell for hacking/pentesting☆4,550Updated 3 weeks ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,008Updated last year
- Windows Exploit Suggester - Next Generation☆4,231Updated last week
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,034Updated 4 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,446Updated last month
- A swiss army knife for pentesting networks☆8,461Updated 11 months ago
- Attack Surface Management Platform☆8,139Updated last month
- Mimikatz implementation in pure Python☆2,880Updated last month
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,580Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,528Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,189Updated last year
- Six Degrees of Domain Admin☆9,912Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,479Updated last month
- Monitor linux processes without root permissions☆4,965Updated last year
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,202Updated last week
- Adversary Emulation Framework☆8,567Updated last week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,263Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,152Updated 7 months ago
- Next generation web scanner☆5,562Updated 4 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,972Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,111Updated 2 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,462Updated 4 years ago