iamshafayat / ReconProLinks
ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.
☆43Updated 4 months ago
Alternatives and similar repositories for ReconPro
Users that are interested in ReconPro are comparing it to the libraries listed below
Sorting:
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Updated 5 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 10 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆87Updated 2 months ago
- Protection against HTML smuggling attacks.☆101Updated 7 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated last year
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Updated 7 months ago
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Updated last month
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆159Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 10 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆81Updated 8 months ago
- ☆195Updated 9 months ago
- A collection of servers which are deliberately vulnerable to learn Pentesting MCP Servers.☆218Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 5 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆239Updated 4 months ago
- A research project to add some brrrrrr to Burp☆197Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Updated 2 weeks ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57Updated 8 months ago
- A web CTF for training developers in bug hunting and secure coding!☆100Updated last year
- ☆144Updated 8 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Updated 2 months ago
- ☆186Updated 2 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆231Updated last week
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 11 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 6 months ago
- A fast, customizable service detection tool powered by a flexible fingerprint system. It helps you identify services, APIs, and network c…☆41Updated this week