dokDork / SiteSniperLinks
bash script to automate the penetration test
☆19Updated last month
Alternatives and similar repositories for SiteSniper
Users that are interested in SiteSniper are comparing it to the libraries listed below
Sorting:
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆26Updated last month
- ☆40Updated 3 months ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆81Updated 3 weeks ago
- DPULSE - Tool for complex approach to domain OSINT☆146Updated 3 weeks ago
- Command Line Sock Puppet Creator for Investigators.☆81Updated 4 months ago
- My personal knowledge repository☆13Updated 3 weeks ago
- 🔥AI-Terminal-X is an AI-powered Linux terminal assistant🔥 that converts natural language commands into executable terminal commands usi…☆19Updated 2 weeks ago
- DarkWeb Resources☆73Updated 2 weeks ago
- Cast your OSINT net further a field and see what else you can discover on the Internet.☆88Updated last month
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- A list of application tools and information resources to help you effectively use regular expressions in OSINT (Open Source Intelligence)☆73Updated last year
- List of GREP modifications and alternatives for a variety of purposes☆130Updated 6 months ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆14Updated 3 months ago
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆129Updated 7 months ago
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆54Updated this week
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 11 months ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆33Updated 2 months ago
- All-sources tool to search websites by favicons☆167Updated 9 months ago
- Knowledge Management for Offensive Security Professionals Official Repository