allfro / sploitego
Maltego Penetration Testing Transforms
☆359Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for sploitego
- The OSINT Omnibus (beta release)☆328Updated 6 months ago
- Intelligence and Reconnaissance Package/Bundle installer.☆234Updated 4 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆170Updated 7 years ago
- ☆267Updated 3 years ago
- A unified console to perform the "kill chain" stages of attacks.☆199Updated last year
- A modular recon tool for pentesting☆230Updated 6 years ago
- Automater - IP URL and MD5 OSINT Analysis☆535Updated 3 months ago
- information gathering via dorks☆374Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆225Updated 5 years ago
- Tool to automate common OSINT tasks☆302Updated 8 months ago
- osint_tools_security_auditing☆147Updated 8 years ago
- Passive Vulnerability Auditor☆128Updated 8 years ago
- search for hosts info with shodan☆228Updated 3 years ago
- ☆149Updated last year
- myBFF - a Brute Force Framework☆138Updated 11 months ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- The Traditional Swiss Army Knife for OSINT☆534Updated 3 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆144Updated 7 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆397Updated 5 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆332Updated 7 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 6 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆264Updated last year
- SpeedPhishing Framework☆439Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆338Updated 2 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆94Updated 7 years ago
- network reconnaissance toolkit☆418Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆269Updated 7 years ago