Knowledge-Wisdom-Understanding / recon
Enumerate a target Based off of Nmap Results
☆78Updated last year
Alternatives and similar repositories for recon:
Users that are interested in recon are comparing it to the libraries listed below
- Web Recon & Exploitation Tool.☆55Updated 5 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 6 months ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- Tool to find SMTP servers vulnerable to open relay☆79Updated 5 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- An epic web shell☆84Updated 2 months ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Automated Tools Pentest☆7Updated last year
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆43Updated last year
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Another Subdomain ENumeration Tool☆11Updated 2 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆70Updated last year
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆20Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆205Updated 5 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- Burp Suite extension to discover assets from HTTP response.☆224Updated 2 months ago
- Asynchronous wordlist based DKIM scanner☆58Updated 3 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago