mschwager / gitemLinks
A Github organization reconnaissance tool.
☆220Updated 2 years ago
Alternatives and similar repositories for gitem
Users that are interested in gitem are comparing it to the libraries listed below
Sorting:
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Tool for breaking into web applications.☆92Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆189Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Automated digital reconnaissance☆201Updated 2 years ago
- Shodan HQ nmap plugin - passively scan targets☆156Updated 9 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- Get detailed information about a Twitter user activity☆101Updated 10 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆254Updated 8 years ago
- Common Findings Database☆101Updated 6 years ago
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- ☆90Updated last month
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Extract Sense out of Gibberish stuff☆82Updated 8 years ago
- ☆92Updated 7 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- Passive Vulnerability Auditor☆134Updated 9 years ago
- Various Cheat Sheets related to development and security☆143Updated 5 years ago
- Paskto - Passive Web Scanner☆151Updated 6 years ago
- For importing, searching, and managing public password breach data☆161Updated last year
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- SpiderLabs shared Nmap Tools☆229Updated 5 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆150Updated 8 years ago