ReconPal: Leveraging NLP for Infosec
☆57May 23, 2022Updated 3 years ago
Alternatives and similar repositories for reconpal
Users that are interested in reconpal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 13, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Passive-Recursive DNS daemon☆26Sep 20, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 3 years ago
- A WLAN red team framework.☆159Feb 9, 2026Updated last month
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆71Mar 3, 2020Updated 6 years ago
- Shodan Monitoring integration for TheHive.☆130Dec 12, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 3 years ago
- ☆36Apr 24, 2024Updated last year
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆29May 16, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Updated this week
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆169Feb 4, 2023Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆919Oct 30, 2024Updated last year
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- A Multitool For Tracking And Locating Nearby Devices Via Their RF Activities.☆124Mar 18, 2023Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆17Apr 18, 2021Updated 4 years ago