Pattern recognition for hosts, services, and content
☆765Mar 16, 2026Updated last week
Alternatives and similar repositories for recog
Users that are interested in recog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data Analysis Pipeline☆160Feb 13, 2025Updated last year
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Jan 15, 2026Updated 2 months ago
- Fast Application Layer Scanner☆2,084Mar 16, 2026Updated last week
- Application and Service Fingerprinting☆134Dec 8, 2022Updated 3 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆194Jan 6, 2026Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,983Feb 20, 2026Updated last month
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆546May 1, 2025Updated 10 months ago
- The Data Analysis Pipeline☆17Apr 23, 2019Updated 6 years ago
- A default credential scanner.☆1,503Jul 8, 2025Updated 8 months ago
- A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)☆3,550Jul 21, 2025Updated 8 months ago
- Quickly Search Large DNS Datasets☆585Dec 21, 2020Updated 5 years ago
- Fast DNS Lookup Library and CLI Tool☆1,098Jan 24, 2026Updated 2 months ago
- Internet data acquisition☆152Jan 1, 2021Updated 5 years ago
- ☆1,288Jul 13, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,463Oct 1, 2025Updated 5 months ago
- Convolutional neural network for analyzing pentest screenshots☆1,279Mar 8, 2026Updated 2 weeks ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,660Jan 5, 2026Updated 2 months ago
- ☆17Oct 5, 2014Updated 11 years ago
- Project Sonar☆237Feb 13, 2025Updated last year
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated 2 months ago
- Your Everyday Threat Intelligence☆1,959Mar 16, 2026Updated last week
- Rex provides a variety of classes useful for security testing and exploit development.☆51Oct 4, 2023Updated 2 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆125Jan 22, 2026Updated 2 months ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- Utility program to perform multiple operations for a given subnet/CIDR ranges.☆1,190Updated this week
- Automated Adversary Emulation Platform☆6,831Updated this week
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆681Oct 28, 2023Updated 2 years ago
- Internet data processing tools☆54Jan 1, 2021Updated 5 years ago
- Standalone utility for service discovery on open ports!☆743Jan 13, 2026Updated 2 months ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- CLI tool for open source and threat intelligence☆1,271Feb 27, 2025Updated last year