WebBreacher / orcsLinks
OSINT Resource Classification System
☆151Updated 6 years ago
Alternatives and similar repositories for orcs
Users that are interested in orcs are comparing it to the libraries listed below
Sorting:
- Domain name permutation engine for detecting typo squatting, phishing and corporate espionage☆92Updated 8 years ago
- R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environmen…☆228Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 5 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Updated 6 years ago
- POOPAK - TOR Hidden Service Crawler☆136Updated 2 months ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆294Updated 3 years ago
- ☆132Updated 4 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- ANWI - All New Wireless IDS☆29Updated 7 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆87Updated 6 years ago
- Distributed Network Vulnerability Scanner☆125Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆300Updated 5 years ago
- Security Testing is not as simple as right click > Scan. It's messy, a tough game. What if you had missed to test just that one thing and…☆276Updated last year
- Hashcat wrapper to help automate the cracking process☆118Updated 7 years ago
- Collect information about email addresses from Pastebin☆39Updated 4 years ago
- Darknet Osint Graph Explorer☆126Updated 5 years ago
- Real Time Threat Monitoring Tool☆114Updated 3 years ago
- a hash query tool☆36Updated 6 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Updated 5 years ago
- Social Engineering Tool☆189Updated 7 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆146Updated 6 years ago
- Combining OSINT sources in Elastic Stack☆78Updated 5 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆224Updated 2 years ago
- A modular Python application to collect intelligence for malicious hosts.☆272Updated 4 years ago
- Monitor, Alert, and Discover sensitive info and data leakage on Github.☆111Updated 4 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Updated 6 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.☆246Updated 4 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159Updated last year