Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
☆20Aug 19, 2025Updated 8 months ago
Alternatives and similar repositories for Offensive-Recon
Users that are interested in Offensive-Recon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆105Feb 12, 2025Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 7 months ago
- Flipper Zero FW [ROGUEMASTER]☆19Sep 11, 2022Updated 3 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆99Sep 27, 2025Updated 7 months ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- ☆10Sep 12, 2024Updated last year
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆12Mar 3, 2025Updated last year
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆12Jan 10, 2023Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- ☆12Dec 18, 2017Updated 8 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ResFi - a framework supporting creation of RRM functionality in residential WiFi deployments.☆10Jun 1, 2017Updated 8 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆101Oct 13, 2025Updated 6 months ago
- Python Pickle RCE Exploit + vulnerable Flask App☆15Aug 27, 2021Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Hoppr Cop is a cli and python library that generates high quality vulnerability information from a cyclone-dx Software Bill of Materials …☆25Dec 16, 2024Updated last year
- ☆26Feb 5, 2026Updated 2 months ago
- ☆10Apr 2, 2022Updated 4 years ago
- ☆22Aug 3, 2024Updated last year
- ☆11Apr 21, 2022Updated 4 years ago