A fully automated subdomain reconnaissance and sensitive data discovery toolkit.
☆46Jun 29, 2025Updated 8 months ago
Alternatives and similar repositories for rec0n
Users that are interested in rec0n are comparing it to the libraries listed below
Sorting:
- Enumerate your Kubernetes cluster with just 1 command☆11Feb 25, 2026Updated last week
- Resources from Jamal & Giuliana's presentation on reserving bytecode into bounties for Jira and Confluence Plugins [BSides Canberra and K…☆22Nov 7, 2025Updated 4 months ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- 直接在桌面顯示彈幕 Display bullet screen directly on the desktop☆10Mar 2, 2026Updated last week
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- Made VRChat Avatar creation and testing easier☆10Dec 28, 2022Updated 3 years ago
- ☆10Mar 11, 2017Updated 8 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- ☆31Feb 19, 2026Updated 2 weeks ago
- ☆13Dec 28, 2019Updated 6 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆48Updated this week
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- HackRF experimentation☆11Jun 3, 2023Updated 2 years ago
- Telegram hacking tool☆13Jul 14, 2021Updated 4 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆17Jul 11, 2025Updated 7 months ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 5 months ago
- ☆13Mar 14, 2015Updated 10 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Discover related domains using Whois data from whoxy.com☆15May 30, 2023Updated 2 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 4 months ago
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated last year
- ☆12Feb 20, 2022Updated 4 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Nov 26, 2024Updated last year
- 安全好文整理,松鼠症患者福音☆13Nov 30, 2023Updated 2 years ago
- CRLF Detection based on @BlackFan 's work See link below☆16Mar 14, 2024Updated last year
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- KQL Sentinel and Defender Detection and Hunting Queries.☆15Feb 24, 2026Updated 2 weeks ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆15Oct 11, 2023Updated 2 years ago
- ☆48Oct 11, 2025Updated 4 months ago
- 「🧹」Clear logs after an invasion☆18Dec 7, 2024Updated last year
- ProxyWatch☆41Feb 28, 2026Updated last week
- My Powershell notes☆15Sep 27, 2022Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago