iamshafayat / ReconProLinks
ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.
☆40Updated 2 months ago
Alternatives and similar repositories for ReconPro
Users that are interested in ReconPro are comparing it to the libraries listed below
Sorting:
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 6 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆75Updated 3 months ago
- Web Server Vulnerability Scanning Tool☆36Updated 9 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated this week
- Protection against HTML smuggling attacks.☆99Updated 5 months ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated 11 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- ☆180Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 4 months ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆31Updated 5 months ago
- BlueSky OSINT Tool☆14Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last week
- Hijack a slack bot to phish your way in☆57Updated 4 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆229Updated 2 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 3 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆81Updated 7 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆136Updated 3 weeks ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Updated last year
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆45Updated 4 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Stalker, the Extensible Attack Surface Management tool.☆88Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- ☆191Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 4 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆45Updated 4 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆83Updated 2 months ago
- ☆22Updated 9 months ago