A tool to check microsofts user real endpoint to get data about a tenant.
☆16Feb 6, 2025Updated last year
Alternatives and similar repositories for realm_osint_ex
Users that are interested in realm_osint_ex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆21Sep 10, 2025Updated 6 months ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- A Linkedin Activity date Finder☆67Feb 21, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆34Mar 6, 2026Updated 3 weeks ago
- Collections of services for search data from passengers lists and emigrants records☆12Jun 3, 2022Updated 3 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- a script that is fairly reliable for web OSINT☆12Jul 20, 2021Updated 4 years ago
- A tool for extract Endpoints, URLs and Secrets from contents☆67Feb 2, 2026Updated last month
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- OSINT: come iniziare. Strumenti e idee per raccogliere e analizzare fonti aperte.☆11Mar 28, 2021Updated 5 years ago
- This document contains a list of tools and platforms that allow for GEOINT analysis focused on Colombia.☆19Oct 8, 2024Updated last year
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- List of all pastebin.com analogs I know of. They are useful for finding leaked personal data☆22Jul 18, 2021Updated 4 years ago
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts me…☆85Updated this week
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- DPULSE - Tool for complex approach to domain OSINT☆161Mar 19, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- List of websites to search for court documents in different countries☆24Jun 1, 2022Updated 3 years ago
- ☆22Dec 30, 2021Updated 4 years ago
- Network/host scanner and information gatherer☆25Oct 21, 2023Updated 2 years ago
- A Rumble, BitChute, and YouTube scraper☆41Jun 13, 2022Updated 3 years ago
- Wistalk : Analyze Wikipedia User's Activity☆25Jun 23, 2025Updated 9 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- A tool for extracting additional data from a person's personal identifiers☆43Nov 14, 2023Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆132Mar 26, 2025Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- A listing of world wide web archives, for humans and machines using Web Archive Manifest (WAM) yaml format☆54Dec 5, 2022Updated 3 years ago
- A comprehensive collection of study materials, practice exams, and resources that helped me successfully pass the CISSP exam.☆15Feb 7, 2025Updated last year
- Awesome list of Search Engines for Cybersecurity Researchers☆294Dec 6, 2025Updated 3 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 3 months ago
- Tools for OSINT in Emirates☆26Apr 13, 2025Updated 11 months ago