allfro / sploitegoLinks
Maltego Penetration Testing Transforms
☆380Updated 6 years ago
Alternatives and similar repositories for sploitego
Users that are interested in sploitego are comparing it to the libraries listed below
Sorting:
- Intelligence and Reconnaissance Package/Bundle installer.☆246Updated 5 years ago
- information gathering via dorks☆400Updated 3 years ago
- The OSINT Omnibus (beta release)☆344Updated last year
- A unified console to perform the "kill chain" stages of attacks.☆205Updated 2 years ago
- ☆275Updated 4 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆175Updated 8 years ago
- A modular recon tool for pentesting☆261Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Updated 3 years ago
- osint_tools_security_auditing☆156Updated 9 years ago
- SpeedPhishing Framework☆448Updated 6 years ago
- Automater - IP URL and MD5 OSINT Analysis☆554Updated last year
- Command line go0gle dorking tool☆141Updated 12 years ago
- The Credential Mapper☆449Updated 8 years ago
- network reconnaissance toolkit☆433Updated 7 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆103Updated 8 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆455Updated 6 years ago
- The Traditional Swiss Army Knife for OSINT☆556Updated 4 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆437Updated 4 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆359Updated 8 years ago
- search for hosts info with shodan☆233Updated 4 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆442Updated 8 years ago
- A Phishing Dropper designed to Pentest.☆277Updated 8 years ago
- Passive Vulnerability Auditor☆136Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Automates some pentest jobs via nmap xml file☆325Updated 7 years ago
- Find phishing kits which use your brand/organization's files and image.☆240Updated 7 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆294Updated 3 years ago
- Does some google dorks against a domain☆165Updated 6 years ago
- Darknet OSINT Transform☆126Updated 7 years ago