sockysec / TargeterLinks
A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT investigations.
☆16Updated 8 months ago
Alternatives and similar repositories for Targeter
Users that are interested in Targeter are comparing it to the libraries listed below
Sorting:
- ☆11Updated 9 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆34Updated 11 months ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆16Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆20Updated 10 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- 🗺 A map of OSINT tools.☆20Updated 2 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Updated 4 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 2 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Updated last year
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆21Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆12Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- python keylogger and spying malware .☆13Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Kali Packerge Manager☆65Updated last year
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆61Updated last month
- Quidam maltego transform☆41Updated 4 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆46Updated 5 months ago
- PHP lab to test captcha bypassing☆31Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆52Updated 2 years ago
- Terminal based fake identity generator.☆26Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated 10 months ago