netsecurity-as / recon365Links
 Gather information from an email address connected to Office 365 
☆85Updated 2 years ago
Alternatives and similar repositories for recon365
Users that are interested in recon365 are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆105Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆122Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆112Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆135Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Helping you delete your old accounts☆85Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 10 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 5 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆217Updated 5 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- ☆55Updated 9 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆53Updated last year
- ☆195Updated 2 years ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 3 weeks ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆47Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- A WLAN red team framework.☆154Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆178Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆31Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 6 months ago