xFreed0m / OSINTerLinks
bash script to prepare Debian machines for OSINT use
☆11Updated 5 years ago
Alternatives and similar repositories for OSINTer
Users that are interested in OSINTer are comparing it to the libraries listed below
Sorting:
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- python tools to assist in penetration testing☆14Updated last month
- Software exploitation training material☆15Updated 8 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- ☆20Updated 11 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 7 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- A python tool that will extract exif data from picture with two methods☆39Updated 3 years ago
- Various exploits☆10Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- ☆19Updated 8 years ago