allfro / sploitegoLinks
Maltego Penetration Testing Transforms
☆374Updated 6 years ago
Alternatives and similar repositories for sploitego
Users that are interested in sploitego are comparing it to the libraries listed below
Sorting:
- The OSINT Omnibus (beta release)☆343Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆241Updated 4 years ago
- information gathering via dorks☆391Updated 3 years ago
- ☆275Updated 4 years ago
- A modular recon tool for pentesting☆259Updated 7 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- osint_tools_security_auditing☆156Updated 9 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆178Updated 8 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- The Traditional Swiss Army Knife for OSINT☆555Updated 4 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Updated 3 years ago
- Automater - IP URL and MD5 OSINT Analysis☆551Updated last year
- The Credential Mapper☆447Updated 7 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆102Updated 8 years ago
- Command line go0gle dorking tool☆139Updated 12 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆433Updated 4 years ago
- A python based LinkedIn enumeration tool☆566Updated 2 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆291Updated 2 years ago
- network reconnaissance toolkit☆431Updated 6 years ago
- Parsero | Robots.txt audit tool☆173Updated 8 years ago
- Darknet OSINT Transform☆123Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆274Updated 8 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆455Updated 6 years ago
- Does some google dorks against a domain☆167Updated 5 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Updated 6 years ago
- Specify targets and run sets of tools against them☆384Updated 6 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 7 years ago
- search for hosts info with shodan☆232Updated 4 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆150Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated 11 months ago