L4bF0x / osintcomparison
☆20Updated 7 years ago
Alternatives and similar repositories for osintcomparison:
Users that are interested in osintcomparison are comparing it to the libraries listed below
- Passive recon / OSINT automation script☆40Updated 6 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- A LinkedIn Scraper☆16Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- ☆34Updated last month
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆45Updated 6 years ago
- GreyNoise Maltego integration and transforms☆20Updated last year
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆80Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Look up an email domain (@example.com), using Python, across all known domains.☆44Updated last year
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- ☆19Updated 9 years ago
- Yet another open S3 bucket finder☆20Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆20Updated 7 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- Create lists from nmap output.☆13Updated 4 years ago