A modular recon tool for pentesting
☆264Apr 21, 2018Updated 7 years ago
Alternatives and similar repositories for LHF
Users that are interested in LHF are comparing it to the libraries listed below
Sorting:
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆179Jul 29, 2017Updated 8 years ago
- Tool to automate common OSINT tasks☆425Mar 15, 2024Updated last year
- ☆93Jul 2, 2018Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,229Nov 20, 2025Updated 3 months ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- ☆104Aug 14, 2019Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Database of websites for penetration testing☆181Jan 15, 2020Updated 6 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetrat…☆1,464Oct 23, 2023Updated 2 years ago
- The OSINT Omnibus (beta release)☆349May 20, 2024Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆533Nov 4, 2016Updated 9 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- The Credential Mapper☆451Dec 1, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago