Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for uphost and Run Masscan to grap CNAME entries, take the screenshot of all the found subdomains using WebScreeShot and more...
☆159May 1, 2024Updated last year
Alternatives and similar repositories for DomainRecon
Users that are interested in DomainRecon are comparing it to the libraries listed below
Sorting:
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆389Mar 3, 2025Updated 11 months ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Runtime memory analysis framework to identify Android malware☆145Apr 24, 2018Updated 7 years ago
- ☆122Mar 27, 2017Updated 8 years ago
- ☆59May 1, 2019Updated 6 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆305Oct 14, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Vulnerable OTP/2FA Application written in PHP using Google Authenticator☆86Nov 13, 2019Updated 6 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆629Feb 5, 2019Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Windows passwords decryption from dump files☆510Feb 2, 2023Updated 3 years ago
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- Drupal enumeration & exploitation tool☆612Nov 4, 2020Updated 5 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Sep 23, 2015Updated 10 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13May 15, 2014Updated 11 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage