woj-ciech / offensive-osint
Scripts related to offensiveosint.io
☆21Updated 4 years ago
Alternatives and similar repositories for offensive-osint:
Users that are interested in offensive-osint are comparing it to the libraries listed below
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- ☆33Updated 3 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆36Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Collect OSINT from git repositories☆20Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆27Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆28Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Detect firearm and nudity on Twitter and Instagram☆13Updated 6 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago