Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for uphost and Run Masscan to grap CNAME entries, take the screenshot of all the found subdomains using WebScreeShot and more...
☆159May 1, 2024Updated last year
Alternatives and similar repositories for DomainRecon
Users that are interested in DomainRecon are comparing it to the libraries listed below
Sorting:
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated last year
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- Runtime memory analysis framework to identify Android malware☆145Apr 24, 2018Updated 7 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- ☆59May 1, 2019Updated 6 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Exploit code developed/reproduced by me☆89Jan 25, 2023Updated 3 years ago
- ☆122Mar 27, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆628Feb 5, 2019Updated 7 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- Various Tools and Docker Images☆280Apr 26, 2025Updated 10 months ago
- Windows passwords decryption from dump files☆512Feb 2, 2023Updated 3 years ago
- Drupal enumeration & exploitation tool☆610Nov 4, 2020Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,451Nov 20, 2025Updated 4 months ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆364Aug 24, 2025Updated 6 months ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆749Apr 12, 2022Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Pastebin OSINT Harvester☆329Apr 27, 2019Updated 6 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆153Dec 7, 2022Updated 3 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- ☆2,319Dec 8, 2023Updated 2 years ago