WebBreacher / orcsLinks
OSINT Resource Classification System
☆152Updated 6 years ago
Alternatives and similar repositories for orcs
Users that are interested in orcs are comparing it to the libraries listed below
Sorting:
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- Automated Pentest Tools Designed For Parrot Linux☆86Updated 6 years ago
- R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environmen…☆228Updated 6 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆291Updated 2 years ago
- Distributed Network Vulnerability Scanner☆124Updated 6 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆124Updated 6 years ago
- Domain name permutation engine for detecting typo squatting, phishing and corporate espionage☆93Updated 7 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Updated 5 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆87Updated 6 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Updated 6 years ago
- ☆131Updated 4 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- search for hosts info with shodan☆233Updated 4 years ago
- Python code to query the Censys public scan database.☆152Updated 4 years ago
- ANWI - All New Wireless IDS☆29Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- a hash query tool☆36Updated 6 years ago
- Hashcat wrapper to help automate the cracking process☆112Updated 7 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆219Updated 2 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- A web-application vulnerability scanner☆117Updated 5 years ago
- vulnerability scanner tool using nmap and nse scripts☆206Updated last year
- Social Engineering Tool☆190Updated 7 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆148Updated 5 years ago