Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
☆20Aug 19, 2025Updated 6 months ago
Alternatives and similar repositories for Offensive-Recon
Users that are interested in Offensive-Recon are comparing it to the libraries listed below
Sorting:
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆36Jan 6, 2025Updated last year
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 10 months ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆101Feb 12, 2025Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆98Sep 27, 2025Updated 5 months ago
- ☆27Mar 5, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆94Oct 13, 2025Updated 4 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 5 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Param…☆40Oct 2, 2023Updated 2 years ago
- Talosplus is a fast and robust template based Intelligent automation framework primarily developed for Bug Bounty Automation☆92Mar 7, 2023Updated 2 years ago
- Packet Construction Set☆10Nov 20, 2017Updated 8 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- Smart contract for Pandora - A next-gen community-owned DEX☆11Aug 2, 2024Updated last year
- ☆14Feb 21, 2022Updated 4 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Jun 19, 2024Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Oct 29, 2024Updated last year
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 7 months ago
- A script to build a Docker image for a DNN Platform website☆10Feb 8, 2018Updated 8 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- A Stress Testing Tool for Darknet Sites: Opens up Infinite Tabs with the URL that you pass in the UI, an HTTP/HTTPS GET attack.☆11Oct 14, 2021Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago