ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.
☆44Feb 23, 2026Updated last week
Alternatives and similar repositories for ReconPro
Users that are interested in ReconPro are comparing it to the libraries listed below
Sorting:
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Jul 6, 2025Updated 7 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- Make inso available in your GitHub Actions workflows☆11Jul 16, 2025Updated 7 months ago
- ☆13Jun 15, 2024Updated last year
- Shared features of vscode-clangd and coc-clangd☆13Feb 25, 2026Updated last week
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆30Feb 15, 2024Updated 2 years ago
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆29Mar 27, 2025Updated 11 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆52Jan 16, 2026Updated last month
- A cookiecutter template for creating a new LLM plugin that adds tools to LLM☆29May 27, 2025Updated 9 months ago
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆18Sep 28, 2018Updated 7 years ago
- Windows anti-debugging sandbox☆40Dec 24, 2025Updated 2 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- ☆23Mar 4, 2025Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 5 months ago
- Python3 library for sophisticated timing attacks using Gaussian Mixture Model.☆22Apr 10, 2022Updated 3 years ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Sep 19, 2025Updated 5 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆127Aug 23, 2025Updated 6 months ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- Next-Toggle is just a simple plug and use, theme toggle button with multiple light and dark themes.☆11May 9, 2024Updated last year
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated last month
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Updated this week
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 5 months ago
- Ardumoto Motor Driver Shield for Arduino, created by and available from SparkFun Electronics☆10Aug 13, 2019Updated 6 years ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆74Feb 16, 2026Updated 2 weeks ago
- The Python book for developers who miss curly braces. Learn real Python while complaining about whitespace. 15 chapters of education, com…☆15Aug 21, 2025Updated 6 months ago
- ☆13Apr 14, 2025Updated 10 months ago
- ✏ Solidity support for VSCode☆10Jan 11, 2023Updated 3 years ago
- Optimization in python☆11Oct 5, 2018Updated 7 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- Is Tomorrow's YouTube free & fair ? The open source whitepaper of the Dreamvo project.☆11Sep 28, 2020Updated 5 years ago
- MVP for updated PEP 543 proposal☆14Feb 13, 2026Updated 3 weeks ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆16Feb 25, 2026Updated last week
- Cookiecutter skeleton for minimal flask app☆10Jun 27, 2022Updated 3 years ago
- ☆12Mar 14, 2022Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 7 months ago