Smaash / snitchLinks
information gathering via dorks
☆385Updated 3 years ago
Alternatives and similar repositories for snitch
Users that are interested in snitch are comparing it to the libraries listed below
Sorting:
- The Credential Mapper☆443Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆345Updated 3 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆238Updated 4 years ago
- Command-line tool to scan Google search results for vulnerabilities☆524Updated this week
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆280Updated 2 years ago
- The OSINT Omnibus (beta release)☆341Updated last year
- network reconnaissance toolkit☆421Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- Social engineering tool for human hacking☆121Updated 8 years ago
- Maltego Penetration Testing Transforms☆369Updated 5 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆454Updated 6 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆146Updated 7 years ago
- The Traditional Swiss Army Knife for OSINT☆546Updated 3 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆256Updated 4 years ago
- ☆270Updated 4 years ago
- Easy way to brute-force web directory.☆151Updated 5 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆726Updated last year
- SpeedPhishing Framework☆445Updated 5 years ago
- 🔎 shodansploit > v1.3.0☆533Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆273Updated 8 years ago
- BinGoo! A Linux bash based Bing and Google Dorking Tool☆229Updated 6 years ago
- Auto Scanning to SSL Vulnerability☆631Updated 4 years ago
- A unified console to perform the "kill chain" stages of attacks.☆204Updated last year
- Tools for information gathering☆344Updated last year
- Git all your favorite tools in one click☆266Updated 3 years ago
- ☆180Updated last year
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆174Updated 7 years ago
- An automated Wireless RogueAP MITM attack framework.☆185Updated 6 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆416Updated 6 years ago