Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
☆20Aug 19, 2025Updated 7 months ago
Alternatives and similar repositories for Offensive-Recon
Users that are interested in Offensive-Recon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆105Feb 12, 2025Updated last year
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆99Sep 27, 2025Updated 6 months ago
- Command line tool for macaddress.io API.☆12Dec 11, 2018Updated 7 years ago
- ☆10Sep 12, 2024Updated last year
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential sec…☆59Dec 21, 2025Updated 3 months ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- ☆20Nov 6, 2023Updated 2 years ago
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆13Dec 4, 2024Updated last year
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆12Jan 10, 2023Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- A PoC executing shellcode in Dart☆14Jun 28, 2022Updated 3 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python Pickle RCE Exploit + vulnerable Flask App☆15Aug 27, 2021Updated 4 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆47Feb 16, 2024Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Hoppr Cop is a cli and python library that generates high quality vulnerability information from a cyclone-dx Software Bill of Materials …☆25Dec 16, 2024Updated last year
- ☆26Feb 5, 2026Updated 2 months ago
- ☆22Aug 3, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Apr 21, 2022Updated 3 years ago
- ☆20May 18, 2022Updated 3 years ago
- This script can be used to find html forms in the list of endpoints/urls.☆50Mar 24, 2024Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Smart contract for Pandora - A next-gen community-owned DEX☆11Aug 2, 2024Updated last year
- ☆25Mar 5, 2023Updated 3 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago