ElevenPaths / FOCALinks
Tool to find metadata and hidden information in the documents.
☆3,324Updated 2 years ago
Alternatives and similar repositories for FOCA
Users that are interested in FOCA are comparing it to the libraries listed below
Sorting:
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,117Updated last year
- Metadata harvester☆1,170Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,756Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆14,840Updated this week
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,698Updated 2 years ago
- All In One Web Recon☆2,543Updated 6 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,492Updated last week
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,174Updated 5 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,405Updated last year
- Attack Surface Management Platform☆9,160Updated last month
- https://t.me/i3visioo Solana Mev Bot using rust integrated flashloan, solana arbitrage bot trading flash loan grpc pumpfun shredstream f…☆1,102Updated this week
- CeWL is a Custom Word List Generator☆2,433Updated last week
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,423Updated 2 months ago
- A browser extension for OSINT search☆1,687Updated last week
- Search for leaked credentials☆1,362Updated 4 years ago
- Dark Web OSINT Tool☆3,570Updated this week
- DNS Enumeration Script☆2,875Updated this week
- Reconnaissance Swiss Army Knife☆1,970Updated 4 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,488Updated 2 years ago
- A script that you can run in the background!☆2,919Updated last year
- Advanced vulnerability scanning with Nmap NSE☆3,680Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆3,123Updated last month
- Official Black Hat Arsenal Security Tools Repository☆4,158Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,273Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,778Updated 5 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,467Updated last year
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,317Updated last week
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,770Updated 3 weeks ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,785Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,875Updated last year