IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It also reports all CVEs (with the associated Metasploit module to run) for which different endpoints are affected. This tool uses some of the best search engines (Shodan.io, ZoomEye.org and Censys.io)
☆15May 2, 2022Updated 3 years ago
Alternatives and similar repositories for IP-Finder
Users that are interested in IP-Finder are comparing it to the libraries listed below
Sorting:
- First install { Termux } from Playstore. After opening Follow below commands One by one pkg install git python php curl openssh g…☆11Feb 15, 2021Updated 5 years ago
- Spy the messages from a iDevice with or without passcode.☆18Apr 19, 2022Updated 3 years ago
- Finds the company information you need☆11Apr 19, 2023Updated 2 years ago
- On this page you will find resources and links to vehicle OSINT mainly focused on the UK☆31Nov 9, 2025Updated 4 months ago
- Simple and fast tool to find companies from Companies House database (with their Company Number or Company Name).☆12Jan 23, 2017Updated 9 years ago
- Ethereum smart contract for cross-chain atomic swaps☆21Mar 12, 2019Updated 7 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Apr 6, 2015Updated 10 years ago
- Image Tampering Detection WebApp☆12Jun 12, 2024Updated last year
- Write-up and exploit of tfUSD (TrueFi ) 50M worth of bug.☆25Dec 19, 2021Updated 4 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Read Cyberpunk 2077 hacking minigame details with a phone camera online. OpenCV magic in your browser.☆16Jun 20, 2022Updated 3 years ago
- A FireBase DataBase TakeOver Tool along with POC Generator☆35Sep 16, 2021Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Jul 1, 2021Updated 4 years ago
- Multi-Tooled Phishing Framework. TigerShark intergrates some of the best (in my opinion), phishing tools and frameworks of various langua…☆13Jun 19, 2020Updated 5 years ago
- On this page you will find links to, tools, for researching companies. The list is primarily focused towards the UK.☆37Dec 31, 2025Updated 2 months ago
- By LodCam tool you can generat phishing link of Loding site which can catch victim picture by victim front camera and and also gives you …☆20Aug 22, 2020Updated 5 years ago
- This program spams the target email address by sending any number of mail.☆15Aug 4, 2020Updated 5 years ago
- Python script to generate Apple Client Secret Key with a specified lifespan (default = 6months)☆17Apr 4, 2023Updated 2 years ago
- Script for building Tor for Android from source using Gitlab CI / CD☆12Feb 1, 2026Updated last month
- One gate to all syscalls!☆23Mar 12, 2022Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Address resolution protocol (ARP) implementation in OCaml targeting MirageOS☆23Oct 20, 2025Updated 5 months ago
- Biblioteca em Python que coleta informações cadastrais de empresas do Brasil (CNPJ) obtidas de fontes oficiais (Receita Federal) e export…☆21Nov 29, 2021Updated 4 years ago
- ادات جلب معلوماتUSES SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your targ…☆28Feb 3, 2021Updated 5 years ago
- Script that updates a YouTube video's thumbnail with its comments☆12Dec 27, 2020Updated 5 years ago
- An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.☆19May 12, 2023Updated 2 years ago
- Nano's web scraper!☆20Feb 24, 2021Updated 5 years ago
- A simple way to access files on your computer from any device on the Internet (NO CLOUD)☆13Oct 28, 2020Updated 5 years ago
- Android version of the open source, encrypted, peer-to-peer, Beechat app.☆12Oct 3, 2022Updated 3 years ago
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆15Dec 18, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- CurlX a basic Curl syntax☆15Aug 18, 2025Updated 7 months ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Jul 18, 2021Updated 4 years ago
- Open source, human-powered, electricity generation.☆22Nov 18, 2021Updated 4 years ago
- The Glow language for Blockchain Decentralized Applications.☆60Sep 2, 2025Updated 6 months ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago