methos2016 / recon-ngLinks
Recon-ng is a full-featured Web Reconnaissance framework written in Python.
☆38Updated 9 years ago
Alternatives and similar repositories for recon-ng
Users that are interested in recon-ng are comparing it to the libraries listed below
Sorting:
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆128Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 6 months ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Program to perform vulnerability analysis and automatically generate a report☆57Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 10 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- scripts for pentesting☆88Updated 7 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 6 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 8 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Updated 4 years ago
- Query Shodan and Censys data for fast parsing☆39Updated 7 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 10 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago