netsecurity-as / recon365Links
Gather information from an email address connected to Office 365
☆85Updated 2 years ago
Alternatives and similar repositories for recon365
Users that are interested in recon365 are comparing it to the libraries listed below
Sorting:
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆103Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated 11 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆131Updated 11 months ago
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.☆1Updated last month
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆52Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆41Updated 6 months ago
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆177Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 9 months ago
- Helping you delete your old accounts☆86Updated last year
- Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoc…☆105Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆32Updated 2 years ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆91Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆98Updated 8 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated last week
- masscan with exclusive excludes☆57Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆137Updated last year
- ☆77Updated last year
- Automate Scoping, OSINT and Recon assessments.☆96Updated 5 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- ☆190Updated 2 years ago