List of useful OSINT tools for information gathering. Especially for pentesters 🖖
☆11May 10, 2024Updated last year
Alternatives and similar repositories for OSINT-recon
Users that are interested in OSINT-recon are comparing it to the libraries listed below
Sorting:
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ☆11Nov 29, 2018Updated 7 years ago
- ☆10Nov 17, 2015Updated 10 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- A conglomeration of resources for any color of the rainbow☆14Feb 12, 2026Updated 3 weeks ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- 🎓 The chrome extension to make learning from YouTube faster & easier.☆11Jan 9, 2022Updated 4 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- FTP-like interface over S3 to allow auth users (OAuth, SAML) manage files under some buckets and folders, with normal users and admins.☆11Oct 25, 2020Updated 5 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Own linux scripts and configurations☆14Feb 12, 2025Updated last year
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Tracker blocking lists based on the DuckDuckGo Tracker Radar provided in the popular EasyList format and thus suitable for inclusion in e…☆13May 17, 2022Updated 3 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Sep 11, 2025Updated 5 months ago
- Hash Checker Bypass and Process Hacker☆18Nov 14, 2021Updated 4 years ago
- Microsoft give away books downloader in Linux or Windows☆13Feb 3, 2022Updated 4 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Jul 2, 2022Updated 3 years ago
- Images of Teardowns (CC BY licensed)☆12Jul 7, 2021Updated 4 years ago
- Easily start and stop an X Virtual Frame Buffer from your node apps☆14Aug 16, 2025Updated 6 months ago
- Personal Notes.☆11Jun 2, 2018Updated 7 years ago
- 僕の自学の方法。Mi camino de aprendizaje autodidáctico. My programming self-study road.☆12Aug 13, 2025Updated 6 months ago
- A continuously updates list of free proxies☆14Updated this week
- Windows tray app to paste a password after scanning a fingerprint☆14Dec 8, 2022Updated 3 years ago
- The simplest, most usable and most secure CLI passwords manager for GNU/Linux☆12Jan 1, 2023Updated 3 years ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 4 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- Command-line Remote Access Tool (RAT)☆13Jul 1, 2020Updated 5 years ago
- HackingResources for learning in 2020☆13Feb 15, 2021Updated 5 years ago