Official module repository for the Recon-ng Framework.
☆256Jul 12, 2024Updated last year
Alternatives and similar repositories for recon-ng-marketplace
Users that are interested in recon-ng-marketplace are comparing it to the libraries listed below
Sorting:
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,413Nov 1, 2024Updated last year
- Additional modules for recon-ng☆106Jan 5, 2018Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆167Jan 26, 2018Updated 8 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Yet another open S3 bucket finder☆20Mar 8, 2018Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Subdomain Scanner - the most exhaustive tool for sub-domain recognition and mapping to related IPs and ASNs☆18Jul 4, 2025Updated 8 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,655Jan 5, 2026Updated 2 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- Nmap Web Dashboard and Reporting☆34May 1, 2022Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,772Updated this week
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Automated script to run all modules for a specified list of domains, netblocks or company name☆19Aug 27, 2022Updated 3 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,832Dec 15, 2024Updated last year
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Tool to find metadata and hidden information in the documents.☆3,448Dec 8, 2022Updated 3 years ago
- In-depth attack surface mapping and asset discovery☆14,222Updated this week
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,477Jan 9, 2025Updated last year
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,825Feb 26, 2026Updated last week
- Anti-Automation System☆130Mar 18, 2021Updated 4 years ago
- All In One Web Recon☆2,667Apr 30, 2025Updated 10 months ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆2,319Dec 8, 2023Updated 2 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 8 years ago
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆767Feb 12, 2023Updated 3 years ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,659Nov 28, 2020Updated 5 years ago
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago