InfoSecWarrior / Offensive-ReconLinks
Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
☆14Updated 2 months ago
Alternatives and similar repositories for Offensive-Recon
Users that are interested in Offensive-Recon are comparing it to the libraries listed below
Sorting:
- Burp suite Certificate modification tool☆18Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 5 months ago
- web application pentesting tools for docker☆18Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 2 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆14Updated 2 weeks ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆19Updated 5 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 3 years ago
- SMTP Open Relay Exploitation☆14Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆15Updated 7 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Site fast fuzzing with chorme extension.☆25Updated 3 years ago
- Script Recon Bug Bounty☆10Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆17Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- C2Matrix Automation☆11Updated last year
- CVE-2020-5902☆9Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago