Automated digital reconnaissance
☆203Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for instarecon
Users that are interested in instarecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆178Jul 29, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Some works on Nmap Scripts (NSE)☆89Jun 2, 2024Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- An automated SMB relay exploitation script.☆153Oct 11, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- svn cloner is a kit for downloading source code through .svn info.☆16Sep 12, 2012Updated 13 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- WebApp Information Gatherer☆550May 29, 2018Updated 7 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆574Dec 9, 2017Updated 8 years ago
- Plecost - Wordpress finger printer Tool☆344Mar 1, 2023Updated 3 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- A GPL fork of the popular wordpress vulnerability scanner WPScan☆214Aug 23, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,388Jun 17, 2022Updated 3 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Aug 23, 2018Updated 7 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆352Jan 12, 2023Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Network Attack Tool☆1,497May 1, 2023Updated 2 years ago