HernanRodriguez1 / BrowserOSINTLinks
☆55Updated last year
Alternatives and similar repositories for BrowserOSINT
Users that are interested in BrowserOSINT are comparing it to the libraries listed below
Sorting:
- ☆65Updated 2 years ago
- ☆78Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Automate Scoping, OSINT and Recon assessments.☆111Updated this week
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 8 months ago
- Discovering Typo Squatting on your domains!☆81Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 4 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- Red Team Guides☆144Updated 2 years ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated last year
- ☆25Updated 3 years ago
- Shodan Dorks 2023☆244Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated last week
- List of Command&Control (C2) software☆47Updated 3 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 11 months ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Updated 2 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆53Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆101Updated last year
- Powershell tools used for Red Team / Pentesting.☆80Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Updated 3 years ago