People tracker on the Internet: OSINT analysis and research tool by Jose Pino
☆8,600Jun 20, 2024Updated last year
Alternatives and similar repositories for trape
Users that are interested in trape are comparing it to the libraries listed below
Sorting:
- Incredibly fast crawler designed for OSINT.☆12,712Feb 10, 2026Updated 3 weeks ago
- 🕵️♂️ Offensive Google framework.☆18,465Feb 5, 2026Updated 3 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,768Dec 15, 2024Updated last year
- A curated list of amazingly awesome OSINT☆24,940Feb 4, 2026Updated 3 weeks ago
- Infection Monkey - An open-source adversary emulation platform☆6,956May 1, 2025Updated 10 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,516Jun 10, 2025Updated 8 months ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- A Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf)☆3,977Feb 25, 2022Updated 4 years ago
- Information gathering framework for phone numbers☆15,957Jan 6, 2026Updated last month
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,291Jul 10, 2024Updated last year
- E-mails, subdomains and names Harvester - OSINT☆15,729Feb 22, 2026Updated last week
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,231Aug 26, 2024Updated last year
- Automated Mass Exploiter☆5,211May 22, 2023Updated 2 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,900Aug 15, 2023Updated 2 years ago
- articles☆13,705Apr 3, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,052Mar 17, 2024Updated last year
- Hunt down social media accounts by username across social networks☆73,118Feb 24, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Updated this week
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆16,329Feb 23, 2023Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- The Rogue Access Point Framework☆14,469Feb 4, 2025Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,943Mar 22, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,645Oct 6, 2025Updated 4 months ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,431Feb 20, 2026Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites☆21,565Jan 12, 2026Updated last month
- In-depth attack surface mapping and asset discovery☆14,193Updated this week
- The most complete open-source tool for Twitter intelligence analysis☆1,965Feb 6, 2019Updated 7 years ago
- OSINT Tool for Finding Passwords of Compromised Email Addresses☆2,510Sep 30, 2023Updated 2 years ago
- Dark Web OSINT Tool☆3,790Jan 8, 2026Updated last month
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- Phishing Tool & Information Collector☆4,672Oct 29, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago