Knowledge-Wisdom-Understanding / recon
Enumerate a target Based off of Nmap Results
☆77Updated last year
Alternatives and similar repositories for recon:
Users that are interested in recon are comparing it to the libraries listed below
- Automated Tools Pentest☆7Updated last year
- Tool to find SMTP servers vulnerable to open relay☆79Updated 5 years ago
- Automate Metasploit scanning and exploitation☆114Updated 5 months ago
- Simple Karma Attack☆67Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- Web Recon & Exploitation Tool.☆55Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Collection of scripts that aid in penetration testing of JSON Web Tokens☆58Updated 6 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆204Updated 5 years ago
- An epic web shell