A micro-framework and tool for performing reconnaissance.
☆40Jan 15, 2026Updated 2 months ago
Alternatives and similar repositories for ronin-recon
Users that are interested in ronin-recon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 2 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 2 months ago
- A tool for searching common variations of a human name☆49Dec 13, 2025Updated 3 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python-based web scraper for a darkweb marketplace on the Tor network.☆40Sep 12, 2024Updated last year
- Discovering Typo Squatting on your domains!☆81Jul 30, 2024Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- A Ruby micro-framework for writing and running exploits☆80Jan 15, 2026Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 3 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Want .uf2 files for your switch hacking needs? ask and link to the .bin payload you want, and I may get to it in my free time. I understa…☆17Feb 4, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 8 months ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Apr 6, 2025Updated 11 months ago
- Parsec-like parser combinators for Crystal☆17Nov 17, 2022Updated 3 years ago
- ☆197Jun 11, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- A library to modify another program's memory on linux x64.☆16Sep 10, 2025Updated 6 months ago
- To perform OSINT on an instagram profile☆101Jan 15, 2026Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- The ronin-rb.dev website☆24Jan 12, 2026Updated 2 months ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Jan 15, 2026Updated 2 months ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆66Apr 15, 2024Updated last year
- This repository contains all the tools that I'm creating during the Desec Security Professional Pentest Training☆36Jun 16, 2025Updated 9 months ago
- A collection of boilerplate code and projects for testing ideas☆14Jan 14, 2026Updated 2 months ago