woj-ciech / Danger-zoneLinks
Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.
☆687Updated 5 years ago
Alternatives and similar repositories for Danger-zone
Users that are interested in Danger-zone are comparing it to the libraries listed below
Sorting:
- raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees usin…☆792Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.☆335Updated 6 months ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆496Updated 10 months ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆421Updated last week
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆617Updated 6 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆472Updated 3 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,290Updated 6 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- ☆274Updated 4 years ago
- Interface to manage and centralize Google Alert information☆231Updated 2 years ago
- Data analysis and OSINT framework for Twitter☆410Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆651Updated 3 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆643Updated 2 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆414Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare☆296Updated 6 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆517Updated 7 years ago
- Find open databases - Powered by Binaryedge.io☆1,378Updated 5 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆421Updated 7 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆407Updated last year
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,346Updated last week
- Command-line tool to scan Google search results for vulnerabilities☆528Updated 2 months ago
- Various Tools and Docker Images☆280Updated 4 months ago
- Build interactive map of cameras from Shodan☆1,265Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆16Updated 4 years ago
- wide range mass audit toolkit☆1,030Updated 6 years ago
- network reconnaissance toolkit☆428Updated 6 years ago
- Quark is a data visualization framework.☆221Updated 4 years ago