NS-unina / OSINT-CollectorLinks
☆15Updated 11 months ago
Alternatives and similar repositories for OSINT-Collector
Users that are interested in OSINT-Collector are comparing it to the libraries listed below
Sorting:
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆51Updated 6 months ago
- ☆17Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆33Updated 6 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- Fetch information about a public Google document.☆13Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Updated 2 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆10Updated 3 years ago
- Just a better dirbuster☆13Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- Nqntnqnqmb transform maltego☆24Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago