L4bF0x / osintcomparison
☆20Updated 7 years ago
Alternatives and similar repositories for osintcomparison:
Users that are interested in osintcomparison are comparing it to the libraries listed below
- Passive recon / OSINT automation script☆40Updated 6 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- A LinkedIn Scraper☆16Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 5 years ago
- ☆34Updated last week
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆22Updated 6 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆45Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- ☆19Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- recon-ng modules for Censys☆36Updated last year
- Pentesting Tools☆21Updated 2 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- A few transforms and a machine for parsing Nmap XML results☆36Updated 8 years ago
- Custom scripts used during the scenario☆21Updated 3 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Yet another open S3 bucket finder☆19Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆45Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated 2 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago