j3ssie / IPOsintLinks
⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project
☆178Updated 5 years ago
Alternatives and similar repositories for IPOsint
Users that are interested in IPOsint are comparing it to the libraries listed below
Sorting:
- search for hosts info with shodan☆230Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Collect information about email addresses from Pastebin☆36Updated 4 years ago
- penetration testing scripts☆136Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆386Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- Some scripts and exploits☆146Updated 6 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆230Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated 2 weeks ago
- Collection of social engineering payloads☆296Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- ☆206Updated 4 years ago