Zeyad-Azima / Need-IP
A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more
☆12Updated 2 years ago
Alternatives and similar repositories for Need-IP:
Users that are interested in Need-IP are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- ☆12Updated 4 years ago
- ☆34Updated last week
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆8Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- parsers to make life easier☆12Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago