☆13Mar 20, 2023Updated 3 years ago
Alternatives and similar repositories for CloudRecon
Users that are interested in CloudRecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆25Jun 28, 2020Updated 5 years ago
- Awesome cloud enumerator☆42Sep 12, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆20Dec 8, 2023Updated 2 years ago
- ASN reconnaissance script☆28Jun 14, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- In-depth Attack Surface Mapping and Asset Discovery☆26Aug 24, 2020Updated 5 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆34Aug 3, 2020Updated 5 years ago
- ☆114May 25, 2023Updated 2 years ago
- ☆11Dec 10, 2023Updated 2 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- A python script that finds endpoints in JavaScript files☆47Sep 5, 2019Updated 6 years ago
- Hello and welcome to my GitHub account. If you'd like to know more about me, this is likely the best place to start☆16Oct 4, 2017Updated 8 years ago
- In-depth DNS Enumeration and Network Mapping☆36Mar 10, 2019Updated 7 years ago
- 🤖 The Modern Port Scanner 🤖☆14Nov 5, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆49Jan 19, 2019Updated 7 years ago
- A static website template for security pages.☆19Jun 29, 2018Updated 7 years ago
- Ease-of-use extension for Web Application penetration testing☆23Jun 20, 2017Updated 8 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆19Jun 2, 2017Updated 8 years ago
- A high-performance DNS stub resolver for bulk lookups☆24Jun 23, 2017Updated 8 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆20Mar 11, 2025Updated last year
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- ☆97May 26, 2019Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆238Jan 10, 2024Updated 2 years ago
- ☆195Aug 1, 2024Updated last year
- ☆37Dec 13, 2023Updated 2 years ago
- Parseltongue is a powerful prompt hacking tool/browser extension for real-time tokenization visualization and seamless text conversion, s…☆15Jan 11, 2025Updated last year
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- .NET Binary Deserializer/Serializer - For all formats: [MC-NBFX], [MC-NBFS], [MC-NBFSE]☆20Feb 25, 2019Updated 7 years ago
- ☆13Jul 19, 2017Updated 8 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- FACEBOOK BOT SPAM SHARE The function of this tool is to share spam posts you want using the URL post from Facebook Lite. You need an ext…☆15Jan 11, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆45Mar 13, 2018Updated 8 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆45Jun 30, 2018Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- A (partial) TLS 1.3 implementation in Java.☆14Apr 24, 2025Updated 11 months ago