evilsocket / xrayLinks
XRay is a tool for recon, mapping and OSINT gathering from public networks.
☆2,265Updated last year
Alternatives and similar repositories for xray
Users that are interested in xray are comparing it to the libraries listed below
Sorting:
- online port scan scraper☆1,119Updated 2 years ago
- Subdomain enumeration and information gathering tool☆1,336Updated 3 weeks ago
- wide range mass audit toolkit☆1,030Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,156Updated 5 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,712Updated 9 months ago
- Striker is an offensive information and vulnerability scanner.☆2,298Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,784Updated last year
- Know the dangers of credential reuse attacks.☆2,066Updated 10 months ago
- Find exploits in local and online databases instantly☆1,749Updated 3 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆638Updated 2 years ago
- A default credential scanner.☆1,494Updated last month
- A framework for wireless pentesting.☆1,214Updated 4 years ago
- Metadata harvester☆1,135Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,221Updated 2 months ago
- Reconnaissance Swiss Army Knife☆1,942Updated 4 years ago
- Email recon made fast and easy, with a framework to build on☆957Updated 2 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,218Updated 6 years ago
- Advanced reconnaissance utility☆984Updated last year
- A DNS reconnaissance tool for locating non-contiguous IP space.☆1,709Updated 11 months ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,622Updated 4 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,718Updated last week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,792Updated last month
- DNS Enumeration Script☆2,832Updated last week
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,279Updated this week
- Network Infrastructure Penetration Testing Tool☆1,657Updated 4 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,368Updated 5 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,053Updated last year
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,469Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,169Updated 3 years ago