NS-unina / OSINT-Collector
☆12Updated 5 months ago
Alternatives and similar repositories for OSINT-Collector:
Users that are interested in OSINT-Collector are comparing it to the libraries listed below
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated last month
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 2 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Burp suite Certificate modification tool☆18Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆12Updated 5 years ago
- 「🚪」The hidden hookless backdoor☆12Updated last month
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Python script that automate the process of generating various reverse shells.☆16Updated 3 years ago
- Another vulnerability scanner☆17Updated last year
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆10Updated 6 months ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 2 years ago