Luci-d / OSINT-reconView external linksLinks
List of useful OSINT tools for information gathering. Especially for pentesters ๐
โ11May 10, 2024Updated last year
Alternatives and similar repositories for OSINT-recon
Users that are interested in OSINT-recon are comparing it to the libraries listed below
Sorting:
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)โ18Mar 30, 2021Updated 4 years ago
- Tool useful to discover services behind unknown portsโ14May 20, 2021Updated 4 years ago
- Automate Recon process using Shell Scriptingโ11Nov 26, 2021Updated 4 years ago
- โ10Nov 17, 2015Updated 10 years ago
- AES Ransomware in batchโ11Jun 25, 2024Updated last year
- โ11Nov 29, 2018Updated 7 years ago
- โ11Jul 5, 2016Updated 9 years ago
- Documentaciรณn sobre sistemas embebidosโ12Nov 15, 2024Updated last year
- best tool for hacking via windows cmdโ13Jan 4, 2019Updated 7 years ago
- A conglomeration of resources for any color of the rainbowโ14Updated this week
- ๐ The chrome extension to make learning from YouTube faster & easier.โ11Jan 9, 2022Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.โ12Mar 30, 2021Updated 4 years ago
- Get latest Exploit Databases notification on your Desktopโ16Jan 29, 2020Updated 6 years ago
- Exploits for TRENDNet routersโ13Apr 21, 2020Updated 5 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)โ13Jan 12, 2025Updated last year
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.โ12Jan 20, 2021Updated 5 years ago
- Tool to use Nmap, in Flask with different types of scans. ๐โ14Sep 11, 2025Updated 5 months ago
- Own linux scripts and configurationsโ14Feb 12, 2025Updated last year
- Fastly scans open ports on large networks and bruteforce login mechanism of found servicesโ12Aug 24, 2019Updated 6 years ago
- A collection of cyberchef recipes for use in osint investigationsโ14Jul 2, 2022Updated 3 years ago
- Personal Notes.โ11Jun 2, 2018Updated 7 years ago
- Easily start and stop an X Virtual Frame Buffer from your node appsโ14Aug 16, 2025Updated 5 months ago
- Tracker blocking lists based on the DuckDuckGo Tracker Radar provided in the popular EasyList format and thus suitable for inclusion in eโฆโ13May 17, 2022Updated 3 years ago
- Hash Checker Bypass and Process Hackerโ18Nov 14, 2021Updated 4 years ago
- IcosaSwitch is an All-In-One Switch Hacking applicationsโ17Sep 19, 2021Updated 4 years ago
- Microsoft give away books downloader in Linux or Windowsโ13Feb 3, 2022Updated 4 years ago
- IDS/IPS malware download evasionโ15Feb 21, 2019Updated 6 years ago
- Images of Teardowns (CC BY licensed)โ12Jul 7, 2021Updated 4 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attackโ13Jan 14, 2021Updated 5 years ago
- FTP-like interface over S3 to allow auth users (OAuth, SAML) manage files under some buckets and folders, with normal users and admins.โ11Oct 25, 2020Updated 5 years ago
- ๅใฎ่ชๅญฆใฎๆนๆณใMi camino de aprendizaje autodidรกctico. My programming self-study road.โ12Aug 13, 2025Updated 6 months ago
- A lookup tool created to explore the NJ Arrest file from the FBI. Created for Hack Jersey 2.0โ14Apr 1, 2015Updated 10 years ago
- Download images from URLs within a CSVโ13Jan 6, 2021Updated 5 years ago
- ๅบไบ้ข่ฑ็ไผไธ็จๆทๅๆถ้โ13Feb 3, 2020Updated 6 years ago
- Command-line Remote Access Tool (RAT)โ13Jul 1, 2020Updated 5 years ago
- The simplest, most usable and most secure CLI passwords manager for GNU/Linuxโ12Jan 1, 2023Updated 3 years ago
- A continuously updates list of free proxiesโ14Updated this week
- Windows tray app to paste a password after scanning a fingerprintโ14Dec 8, 2022Updated 3 years ago
- HackingResources for learning in 2020โ13Feb 15, 2021Updated 4 years ago