HernanRodriguez1 / BrowserOSINTLinks
☆55Updated last year
Alternatives and similar repositories for BrowserOSINT
Users that are interested in BrowserOSINT are comparing it to the libraries listed below
Sorting:
- Find CVEs associated to Linux and public exploits on github☆119Updated 6 months ago
- ☆65Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 5 months ago
- ☆78Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆138Updated 5 months ago
- Automate Scoping, OSINT and Recon assessments.☆97Updated this week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- ☆56Updated last month
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆108Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Updated 8 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated 2 years ago
- Discovering Typo Squatting on your domains!☆77Updated last year
- ☆25Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆217Updated 2 weeks ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- List of Command&Control (C2) software☆45Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆51Updated 3 years ago
- ☆127Updated 4 months ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- Red Team Guides☆140Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 3 months ago
- ☆189Updated 6 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 10 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆100Updated 3 months ago