Pentesting automation platform that combines hacking tools to complete assessments
☆520Feb 26, 2026Updated this week
Alternatives and similar repositories for rekono
Users that are interested in rekono are comparing it to the libraries listed below
Sorting:
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,156Updated this week
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆530Feb 5, 2024Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Feb 15, 2024Updated 2 years ago
- Pentesting Reporting Tool☆593Oct 22, 2024Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Aug 21, 2024Updated last year
- Pentest Report Generator☆2,762Updated this week
- Arsenal is a Simple shell script (Bash) used to install tools and requirements for Bug Bounty☆285Jun 3, 2024Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,414Jan 19, 2025Updated last year
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆593Oct 17, 2023Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,342May 21, 2025Updated 9 months ago
- fully automated pentesting tool☆518Dec 8, 2022Updated 3 years ago
- A Web Vulnerability Scanner and Patcher☆170Feb 14, 2026Updated 2 weeks ago
- An XSS Exploitation Tool☆337Dec 5, 2025Updated 2 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆673Feb 17, 2026Updated 2 weeks ago
- Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more☆3,307Feb 16, 2026Updated 2 weeks ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆904Updated this week
- All In One Web Recon☆2,666Apr 30, 2025Updated 10 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- JF⚡can - Super fast port scanning & service discovery using Masscan and Nmap. Scan large networks with Masscan and use Nmap's scripting a…☆666Feb 19, 2026Updated last week
- evilginx3 + gophish☆1,962Jun 15, 2024Updated last year
- For pentesters who don't wanna leave their terminals.☆183Aug 27, 2021Updated 4 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Mar 21, 2024Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- i will upload more templates here to share with the comunity.☆567Apr 17, 2024Updated last year
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆684Jul 15, 2024Updated last year
- PeTeReport is an open-source application vulnerability reporting tool.☆534Jun 10, 2024Updated last year
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,424Jan 19, 2025Updated last year
- OSINT tools and more but without API key☆1,482Feb 15, 2026Updated 2 weeks ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆176Jul 6, 2024Updated last year
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,529Jan 15, 2026Updated last month
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆627May 28, 2025Updated 9 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆729Jan 25, 2026Updated last month