methos2016 / recon-ngView external linksLinks
Recon-ng is a full-featured Web Reconnaissance framework written in Python.
☆38Oct 13, 2015Updated 10 years ago
Alternatives and similar repositories for recon-ng
Users that are interested in recon-ng are comparing it to the libraries listed below
Sorting:
- Short script to decode output logs of *sslsplit* raw HTTP packets.☆18Aug 12, 2016Updated 9 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Mar 23, 2015Updated 10 years ago
- @wifi.id Account Extractor & Checker☆24May 24, 2018Updated 7 years ago
- A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.☆26Apr 11, 2021Updated 4 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- Squatm3gator is a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the…☆32Jan 21, 2026Updated 3 weeks ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- For accessing info of both public and private instagram accounts☆16Aug 29, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- ☆12Sep 10, 2019Updated 6 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- EDHOC (RFC 9528): Lightweight authenticated key exchange in C for IoT and constrained devices☆14Jan 30, 2026Updated 2 weeks ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Oct 2, 2018Updated 7 years ago
- This is a small application in python to crack SSH password using password dictionary.☆27Mar 26, 2016Updated 9 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆33Jan 1, 2026Updated last month
- HANA XS Advanced Python Buildpack and example multi-target-application (This Repository has been archived upon Members choice)☆10Feb 19, 2020Updated 5 years ago
- A reddit scraping and analysis bot to visualize linguistic and content trends☆12Oct 5, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Activities and examples for Machine Learning with Flogo☆14Dec 5, 2025Updated 2 months ago
- Screen recorder / Video Overlay for React Native☆10Apr 30, 2024Updated last year
- ☆12Jul 13, 2020Updated 5 years ago
- Collection of my CTF Writeups, mostly Indonesian CTFs☆13Jan 15, 2024Updated 2 years ago
- This tool is for pranking your friends😂. It will send messages to your friend on WhatsApp Web automatically at fixed interval (e.g. afte…☆11Apr 12, 2021Updated 4 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- ☆12Oct 5, 2020Updated 5 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- 日本語Markdownユーザー会のウェブサイト☆10Jul 18, 2019Updated 6 years ago
- ホッテントリ感情分析☆12Apr 8, 2018Updated 7 years ago
- This project contains Node.js scripts and Microsoft Excel templates for creating realistic sample fact data in SAP Analytics Cloud or oth…☆14Oct 24, 2024Updated last year
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- ☆14Jul 26, 2017Updated 8 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Repository containing files from all plugins projects of my WordPress plugin course (English Version)☆14May 24, 2023Updated 2 years ago
- This bit of code scans over a folder set in a variable, then e-mails a set address if there are permissions for individual users.☆11Sep 12, 2016Updated 9 years ago