☆54May 18, 2024Updated last year
Alternatives and similar repositories for BrowserOSINT
Users that are interested in BrowserOSINT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Jan 29, 2024Updated 2 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆23Feb 8, 2024Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- NOC ELK + FORTINET LOG☆22Sep 9, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 4 months ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Aug 18, 2023Updated 2 years ago
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- wp-config-scan☆81Sep 6, 2023Updated 2 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 7 months ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- Create and publish PiRogue images☆25May 3, 2025Updated 11 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Simple scrapping tool to find quickly the distance between two generic locations (supermarket, store...)☆22Jan 3, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- Vault of Windows Registry forensic artifacts☆28Nov 12, 2025Updated 5 months ago
- Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) web…☆35Mar 13, 2026Updated 3 weeks ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Buffer Overflow para SLmail5.5 32 bits☆17Dec 5, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated 2 years ago
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Organizar documentos sobre OSINT feitos em pt-br☆21Dec 20, 2023Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆52Jun 21, 2025Updated 9 months ago
- ☆14Dec 3, 2022Updated 3 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago