scumsec / Recon-ng-modulesLinks
Additional modules for recon-ng
☆106Updated 7 years ago
Alternatives and similar repositories for Recon-ng-modules
Users that are interested in Recon-ng-modules are comparing it to the libraries listed below
Sorting:
- scripts for pentesting☆88Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆138Updated 12 years ago
- myBFF - a Brute Force Framework☆143Updated 7 months ago
- osint_tools_security_auditing☆156Updated 9 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116Updated 5 years ago
- ☆193Updated 7 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Shodan HQ nmap plugin - passively scan targets☆156Updated 9 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 3 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆150Updated 8 years ago
- ☆150Updated 2 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆64Updated 9 years ago
- penetration testing scripts☆136Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Linux pentest tools☆88Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆125Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Common Findings Database☆102Updated 6 years ago
- Collect information about email addresses from Pastebin☆38Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 7 years ago