scumsec / Recon-ng-modulesLinks
Additional modules for recon-ng
☆104Updated 7 years ago
Alternatives and similar repositories for Recon-ng-modules
Users that are interested in Recon-ng-modules are comparing it to the libraries listed below
Sorting:
- scripts for pentesting☆88Updated 6 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆238Updated 4 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- myBFF - a Brute Force Framework☆140Updated 2 months ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Updated 9 years ago
- Common Findings Database☆100Updated 5 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 8 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Useful pentesting scripts☆83Updated 4 months ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- ☆52Updated 4 years ago
- penetration testing scripts☆136Updated 5 years ago
- tools for analyzing strings from password lists☆59Updated 2 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆161Updated 7 years ago
- osint_tools_security_auditing☆153Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- ☆194Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago