A tool for automating network enumeration and reconnaissance
☆18Jan 20, 2025Updated last year
Alternatives and similar repositories for Reconis
Users that are interested in Reconis are comparing it to the libraries listed below
Sorting:
- ☆19Jan 14, 2026Updated last month
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆159Feb 14, 2026Updated 2 weeks ago
- OG Atomic Red Team☆29Jun 12, 2018Updated 7 years ago
- Notepad++ syntax highlighting and autocompletion for SQF (the scripting language for the ArmA games)☆12Apr 11, 2025Updated 10 months ago
- ☆16Jan 20, 2026Updated last month
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- DigiNode Tools - Setup, monitor and manage a DigiByte Node and DigiAssets Node on a Raspberry Pi or Ubuntu/Debian system.☆10Apr 30, 2025Updated 10 months ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- useful stuff for pentesting☆49Mar 18, 2025Updated 11 months ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- Enable your ollama model to participate in online chats.☆12Mar 16, 2025Updated 11 months ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- ☆13Apr 15, 2024Updated last year
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- Country IP Access list support to nginx proxy manager☆10Jul 9, 2023Updated 2 years ago
- All combinations of various characters, to get the desired word☆20Dec 13, 2023Updated 2 years ago
- ☆11Jul 3, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- ☆10Aug 18, 2017Updated 8 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- RestBook is an open-source CLI tool for orchestrating complex API workflows using simple YAML playbooks.☆16Apr 22, 2025Updated 10 months ago
- Ziesha Helper Tool☆10Jan 13, 2023Updated 3 years ago