operative framework is a rust investigation OSINT framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
☆745May 17, 2025Updated 10 months ago
Alternatives and similar repositories for operative-framework
Users that are interested in operative-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- OSINT Swiss Army Knife☆663Feb 23, 2021Updated 5 years ago
- The Traditional Swiss Army Knife for OSINT☆558Jun 10, 2021Updated 4 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- Chromebackdoor is a PoC of pentest tool, this tool use a MITB technique for generate a windows executable ".exe" after launch run a malic…☆512Jan 8, 2017Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆178Jul 29, 2017Updated 8 years ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- Python framework for IT security tools☆268Jan 28, 2017Updated 9 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- The Credential Mapper☆451Dec 1, 2017Updated 8 years ago
- Data analysis and OSINT framework for Twitter☆412Oct 18, 2020Updated 5 years ago
- Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetrat…☆1,470Oct 23, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 11 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆444Jan 21, 2019Updated 7 years ago
- Information gathering tool - OSINT☆1,390Jun 11, 2021Updated 4 years ago
- The hackers tool belt☆521Aug 6, 2018Updated 7 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,646Jun 6, 2024Updated last year
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆796May 18, 2020Updated 5 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago