woj-ciech / Danger-zoneLinks
Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.
☆690Updated 5 years ago
Alternatives and similar repositories for Danger-zone
Users that are interested in Danger-zone are comparing it to the libraries listed below
Sorting:
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆790Updated 5 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆478Updated 3 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,296Updated 6 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated 2 weeks ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 3 years ago
- Build interactive map of cameras from Shodan☆1,266Updated 5 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆503Updated last year
- Automated network asset, email, and social media profile discovery and cataloguing.☆654Updated 3 years ago
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- network reconnaissance toolkit☆431Updated 6 years ago
- An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.☆338Updated 8 months ago
- Find open databases - Powered by Binaryedge.io☆1,392Updated 5 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆647Updated 3 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆523Updated 8 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆620Updated 7 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆421Updated 7 years ago
- Command-line tool to scan Google search results for vulnerabilities☆534Updated 4 months ago
- Data analysis and OSINT framework for Twitter☆411Updated 5 years ago
- Scanning pastebin with yara rules☆1,112Updated 5 months ago
- Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare☆297Updated 6 years ago
- Analyze the security of any domain by finding all the information possible. Made in python.☆1,862Updated 2 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,355Updated last week
- Various Tools and Docker Images☆280Updated 6 months ago
- ☆275Updated 4 years ago
- online port scan scraper☆1,118Updated 2 years ago
- Information gathering & website reconnaissance | https://phishstats.info/☆456Updated 6 years ago
- wide range mass audit toolkit☆1,032Updated 7 years ago