evyatarmeged / RaccoonLinks
A high performance offensive security tool for reconnaissance and vulnerability scanning
☆3,198Updated last week
Alternatives and similar repositories for Raccoon
Users that are interested in Raccoon are comparing it to the libraries listed below
Sorting:
- File upload vulnerability scanner and exploitation tool.☆3,214Updated last month
- A Tool for Domain Flyovers☆5,780Updated 3 years ago
- Striker is an offensive information and vulnerability scanner.☆2,288Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,260Updated this week
- All In One Web Recon☆2,466Updated last month
- A Workflow Engine for Offensive Security☆5,652Updated last month
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre …☆3,667Updated this week
- The Multi-Tool Web Vulnerability Scanner.☆1,870Updated last year
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,262Updated 11 months ago
- Find web directories without bruteforce☆1,859Updated last year
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,120Updated last week
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,627Updated 6 months ago
- A collection of custom security tools for quick needs.☆3,214Updated 2 years ago
- Attack Surface Management Platform☆8,813Updated 2 weeks ago
- Official Black Hat Arsenal Security Tools Repository☆4,083Updated 9 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,627Updated 9 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,813Updated 3 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,176Updated 11 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,301Updated this week
- HTTP parameter discovery suite.☆5,687Updated 4 months ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,664Updated 7 months ago
- Reconnaissance Swiss Army Knife☆1,923Updated 4 years ago
- Next generation web scanner☆5,927Updated 11 months ago
- Know the dangers of credential reuse attacks.☆2,056Updated 8 months ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,364Updated last year
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,510Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,330Updated 7 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,127Updated 5 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,730Updated this week
- Automated Mass Exploiter☆5,130Updated 2 years ago