lloydamiller / politicosint
OSINT Resources for Politics
☆15Updated 6 years ago
Alternatives and similar repositories for politicosint:
Users that are interested in politicosint are comparing it to the libraries listed below
- ☆33Updated 2 months ago
- recon-ng modules for Censys☆37Updated last year
- Sp00fer blog post -☆26Updated 2 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated last year
- A cover story generator for people who Need Quick Covers On Operations☆13Updated 4 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- Collect OSINT from git repositories☆20Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- Open YARA scan- and search engine☆22Updated last month
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- ☆12Updated 4 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Public exploits☆14Updated 6 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Experimenting with destructive file attacks in Go