InfoSecWarrior / Offensive-ReconLinks
Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
☆15Updated 4 months ago
Alternatives and similar repositories for Offensive-Recon
Users that are interested in Offensive-Recon are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- XSS scanning with Dalfox on Github-action☆25Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16Updated 7 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Automate bug bounty recon using bash alias☆14Updated 11 months ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Updated 3 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- Static analysis of APKs with regular expressions☆10Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 5 months ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆32Updated 10 months ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆20Updated 4 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- My fuzz repo!☆22Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago