An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.
☆349Feb 28, 2025Updated last year
Alternatives and similar repositories for the-endorser
Users that are interested in the-endorser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆23Jan 9, 2019Updated 7 years ago
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OSINT Tool: Generate username lists for companies on LinkedIn☆1,652Jan 15, 2024Updated 2 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,804Feb 28, 2025Updated last year
- Take back your privacy. Lose yourself in the haystack.☆560Feb 28, 2025Updated last year
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆797May 18, 2020Updated 5 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,295Jul 10, 2024Updated last year
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆444Jan 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Facebook OSINT Collection and Analysis Tool☆54Jan 6, 2020Updated 6 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆490May 23, 2023Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆657Jan 6, 2022Updated 4 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 8 months ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- Links for the OSINT Team☆616Oct 8, 2022Updated 3 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- GitHub OSINT tool☆33Mar 30, 2022Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,034May 27, 2020Updated 5 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Data analysis and OSINT framework for Twitter☆414Oct 18, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool to scrape LinkedIn without API restrictions for data reconnaissance☆1,199Apr 11, 2024Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago