R3dy / jigsawLinks
Information Gathering Tool
☆24Updated 12 years ago
Alternatives and similar repositories for jigsaw
Users that are interested in jigsaw are comparing it to the libraries listed below
Sorting:
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Does some google dorks against a domain☆165Updated 6 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Updated 9 years ago
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆102Updated 3 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Updated last week
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Updated 8 years ago
- Take output from nmap and turn it into something easily searchable and readable.☆34Updated 9 years ago
- This repo is for the Ruby version of EyeWitness☆28Updated 11 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 6 years ago
- Homemade scripts to-do various vulnerable challenges☆78Updated 5 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆99Updated last year
- scripts for pentesting☆86Updated 7 years ago
- PwnWiki - The notes section of the pentesters mind.☆27Updated 11 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 6 years ago
- Tool to scrape LinkedIn☆97Updated 8 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- A Blind SQL Exploitation application☆79Updated 13 years ago
- ☆75Updated 11 years ago
- Penetration Testing/Security Cheatsheets☆64Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 11 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 6 years ago
- ☆19Updated 10 years ago
- Just a collection of pentest stuffs☆94Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆175Updated 8 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 11 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago