sharathunni / auto-recon-ngLinks
Automated script to run all modules for a specified list of domains, netblocks or company name
☆20Updated 2 years ago
Alternatives and similar repositories for auto-recon-ng
Users that are interested in auto-recon-ng are comparing it to the libraries listed below
Sorting:
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Dehashed API CLI☆20Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- recon-ng modules for Censys☆37Updated last year
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Create visualization from Shodan query☆73Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- OSINT tool for discovering confidential data leaked on Github.☆50Updated last year
- ☆12Updated 2 months ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 4 years ago
- ☆33Updated 5 months ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- CherryTree OSCP methodology template☆15Updated 6 years ago
- Effectively search the Exploit-DB☆16Updated 5 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆17Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆16Updated 5 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago