☆63Jan 15, 2016Updated 10 years ago
Alternatives and similar repositories for OSINT
Users that are interested in OSINT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Mar 13, 2026Updated last week
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Jul 9, 2012Updated 13 years ago
- osint_tools_security_auditing☆156Oct 9, 2016Updated 9 years ago
- ☆275Feb 20, 2021Updated 5 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Open Source INTelligence☆24Apr 19, 2020Updated 5 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- osintstalker☆706Apr 3, 2015Updated 10 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆23Jan 9, 2019Updated 7 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Combining OSINT sources in Elastic Stack☆78Oct 10, 2020Updated 5 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- OSINT and Digital Investigation tool for Twitter☆27Feb 17, 2018Updated 8 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Retrieve someones private Facebook location, using their public information.☆59Jan 18, 2021Updated 5 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆178Jul 29, 2017Updated 8 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Data analysis and OSINT framework for Twitter☆412Oct 18, 2020Updated 5 years ago
- Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP☆20Feb 22, 2015Updated 11 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- ☆18Nov 6, 2016Updated 9 years ago