maldevel / intelspyLinks
Perform automated network reconnaissance scans
☆238Updated 2 years ago
Alternatives and similar repositories for intelspy
Users that are interested in intelspy are comparing it to the libraries listed below
Sorting:
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆159Updated 2 weeks ago
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆146Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Let's find someone's account☆166Updated 6 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆377Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Updated 5 years ago
- ☆412Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Web Application Vulnerability Scanner☆128Updated 5 years ago
- A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module.☆169Updated 3 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- GUI based offensive penetration testing tool (Open Source)☆219Updated 4 months ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆243Updated last year
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Updated 3 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆347Updated 5 years ago
- XCTR Hacking Tools☆40Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- WITCHCRAFT is a cyberdeck toolkit built for runners who dive deep into the mesh. It’s your all-in-one rig for data-ghosting, ICE-breaking…☆44Updated 4 months ago
- Automate Metasploit scanning and exploitation☆116Updated 4 months ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆95Updated 4 years ago
- Simple Backdoor Manager with Python (based on weevely)☆96Updated 9 months ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆303Updated 3 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆168Updated 4 years ago
- An Open Source Multi Site Automated Social Media Phishing Framework☆153Updated 6 years ago
- Ultimate Recon Software for Information Gathering☆97Updated 5 years ago
- A guide explaining how to use Gophish☆39Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Updated 6 years ago