WebBreacher / orcsLinks
OSINT Resource Classification System
☆151Updated 6 years ago
Alternatives and similar repositories for orcs
Users that are interested in orcs are comparing it to the libraries listed below
Sorting:
- Distributed Network Vulnerability Scanner☆124Updated 6 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆87Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆291Updated 3 years ago
- ☆132Updated 4 years ago
- Domain name permutation engine for detecting typo squatting, phishing and corporate espionage☆92Updated 8 years ago
- Python code to query the Censys public scan database.☆153Updated 4 years ago
- ANWI - All New Wireless IDS☆29Updated 7 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Updated 5 years ago
- R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environmen…☆228Updated 6 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- POOPAK - TOR Hidden Service Crawler☆135Updated 2 months ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Updated 6 years ago
- Social Engineering Tool☆189Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆223Updated 2 years ago
- A modular Python application to collect intelligence for malicious hosts.☆271Updated 4 years ago
- This python script is developed to show, how many vulnerables websites, which are laying around on the web. 1) Scan net for urls prone to…☆54Updated 9 years ago
- A web crawler (for bug hunting) that gathers more than you can imagine.☆149Updated 2 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 7 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆146Updated 6 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Updated 5 years ago
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆16Updated 6 years ago