Official module repository for the Recon-ng Framework.
☆263Jul 12, 2024Updated last year
Alternatives and similar repositories for recon-ng-marketplace
Users that are interested in recon-ng-marketplace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,595Nov 1, 2024Updated last year
- Additional modules for recon-ng☆106Jan 5, 2018Updated 8 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆97May 24, 2018Updated 8 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆170Jan 26, 2018Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆121May 1, 2026Updated 3 weeks ago
- A security tool for grabbing screenshots of many web hosts☆328Jul 17, 2017Updated 8 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 5 years ago
- 🔧 My own simple useful tools for many things☆13Oct 18, 2022Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆16,215May 15, 2026Updated last week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,731Jan 5, 2026Updated 4 months ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- ☆632Feb 1, 2024Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 8 months ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 8 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 4 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,848Apr 13, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Vault 7: CIA Hacking Tools Revealed☆17Mar 8, 2017Updated 9 years ago
- Tool to find metadata and hidden information in the documents.☆3,537Dec 8, 2022Updated 3 years ago
- In-depth attack surface mapping and asset discovery☆14,596Apr 17, 2026Updated last month
- Reconnaissance tool for GitHub organizations☆6,174Sep 20, 2022Updated 3 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre …☆3,874May 12, 2026Updated last week
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆776Feb 12, 2023Updated 3 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- All In One Web Recon☆2,745Apr 30, 2025Updated last year
- This repository has the JSON file required to perform user enumeration on various websites.☆2,520May 4, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Short guide on how to connect to Termux SSH from anywhere while using TailScale as connection link.☆14Aug 30, 2021Updated 4 years ago
- ☆262Sep 6, 2017Updated 8 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,495Jan 9, 2025Updated last year
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Automated script to run all modules for a specified list of domains, netblocks or company name☆19Aug 27, 2022Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,672Nov 28, 2020Updated 5 years ago
- Reconnaissance Swiss Army Knife☆2,049Jan 26, 2021Updated 5 years ago