shadawck / recon-archy
Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title
☆17Updated 4 years ago
Alternatives and similar repositories for recon-archy:
Users that are interested in recon-archy are comparing it to the libraries listed below
- A collection of personal ZAP scripts☆13Updated last year
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆34Updated last year
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆16Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated this week
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- ☆42Updated 2 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- OSINT tool to download archived PDF files from archive.org for a given website.☆48Updated 4 years ago
- NetSPI HTTP Scrapers☆27Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Backend logic implementation for Vulnerability Management System☆20Updated last year
- Totem maltego transform☆27Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆20Updated 2 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- A collection of cyberchef recipes for use in osint investigations☆14Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- recon-ng modules for Censys☆36Updated last year
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- ☆16Updated last year
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year