A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)
☆4,026Feb 25, 2022Updated 4 years ago
Alternatives and similar repositories for social_mapper
Users that are interested in social_mapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,672Jun 20, 2024Updated last year
- Incredibly fast crawler designed for OSINT.☆12,881Feb 10, 2026Updated 3 months ago
- An Open Source Multi Site Automated Social Media Phishing Framework☆158Aug 8, 2019Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,288Nov 20, 2025Updated 6 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,554Apr 21, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BabySploit Beginner Pentesting Toolkit/Framework Written in Python☆1,042Dec 11, 2019Updated 6 years ago
- OSINT python webscaping framework☆1,140Dec 8, 2022Updated 3 years ago
- Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.☆5,098Apr 25, 2024Updated 2 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,848Apr 13, 2026Updated last month
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,993Aug 15, 2023Updated 2 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,309Jul 10, 2024Updated last year
- Python library for accurately querying username and email usage on online platforms☆1,761Apr 27, 2026Updated 3 weeks ago
- Most advanced XSS scanner.☆14,959Apr 26, 2025Updated last year
- Know the dangers of credential reuse attacks.☆2,111Dec 9, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,731Jan 5, 2026Updated 4 months ago
- Like nmap for mapping wifi networks you're not connected to, plus device tracking☆2,730Mar 22, 2026Updated 2 months ago
- A curated list of amazingly awesome OSINT☆26,341May 14, 2026Updated last week
- E-mails, subdomains and names Harvester - OSINT☆16,215May 15, 2026Updated last week
- Attack Surface Management Platform☆10,016Apr 29, 2026Updated 3 weeks ago
- The most complete open-source tool for Twitter intelligence analysis☆1,975Feb 6, 2019Updated 7 years ago
- Reconnaissance Swiss Army Knife☆2,049Jan 26, 2021Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,322May 7, 2026Updated 2 weeks ago
- Automated Mass Exploiter☆5,239May 22, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Phishing Tool & Information Collector☆4,729Oct 29, 2024Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,334Jun 4, 2023Updated 2 years ago
- A Tool for Domain Flyovers☆5,937May 22, 2022Updated 4 years ago
- Build interactive map of cameras from Shodan☆1,268Jun 28, 2020Updated 5 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,564Mar 28, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,080Oct 6, 2025Updated 7 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,912Jan 24, 2024Updated 2 years ago
- A swiss army knife for pentesting networks☆9,131Dec 6, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Command line utility for searching and downloading exploits☆1,809Sep 10, 2025Updated 8 months ago
- A Modern Orchestration Engine for Security☆6,327May 11, 2026Updated last week
- Infection Monkey - An open-source adversary emulation platform☆6,999May 1, 2025Updated last year
- Hunt down social media accounts by username across social networks☆83,419Updated this week
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- Exploitation Framework for Embedded Devices☆13,116May 5, 2026Updated 2 weeks ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,832Nov 19, 2024Updated last year