Smaash / snitchLinks
information gathering via dorks
☆385Updated 3 years ago
Alternatives and similar repositories for snitch
Users that are interested in snitch are comparing it to the libraries listed below
Sorting:
- Selenium powered Python script to automate searching for vulnerable web apps.☆349Updated 3 years ago
- The Credential Mapper☆445Updated 7 years ago
- ☆272Updated 4 years ago
- Command-line tool to scan Google search results for vulnerabilities☆526Updated 3 weeks ago
- Maltego Penetration Testing Transforms☆371Updated 5 years ago
- network reconnaissance toolkit☆425Updated 6 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆453Updated 6 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆241Updated 4 years ago
- search for hosts info with shodan☆231Updated 4 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆435Updated 3 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆174Updated 8 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆147Updated 8 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- Social engineering tool for human hacking☆121Updated 8 years ago
- Command line go0gle dorking tool☆139Updated 12 years ago
- BinGoo! A Linux bash based Bing and Google Dorking Tool☆230Updated 6 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆285Updated 2 years ago
- The OSINT Omnibus (beta release)☆345Updated last year
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆256Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆440Updated 8 years ago
- A python based LinkedIn enumeration tool☆565Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆272Updated 8 years ago
- The Traditional Swiss Army Knife for OSINT☆552Updated 4 years ago
- Linux bash script automation for metasploit☆265Updated 6 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Advanced Hash Manipulation☆177Updated 5 years ago
- Cloak can backdoor any python script with some tricks.☆498Updated 6 years ago
- Tools for information gathering☆346Updated last year
- ☆180Updated 2 years ago