Zeyad-Azima / Need-IPLinks
A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more
☆11Updated 2 years ago
Alternatives and similar repositories for Need-IP
Users that are interested in Need-IP are comparing it to the libraries listed below
Sorting:
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- ☆33Updated 9 months ago
- A semi-automatic osint/recon framework.☆25Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆11Updated 3 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 9 months ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆24Updated last year
- ☆22Updated 5 years ago
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Updated 3 years ago
- Spider or repeater to find all links.☆11Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago