xFreed0m / OSINTerLinks
bash script to prepare Debian machines for OSINT use
☆12Updated 5 years ago
Alternatives and similar repositories for OSINTer
Users that are interested in OSINTer are comparing it to the libraries listed below
Sorting:
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Software exploitation training material☆16Updated 8 years ago
- Various exploits☆10Updated 8 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Notes on offensive training☆16Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Pentest ToolKit☆28Updated 5 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Free Email Providers☆11Updated 2 years ago
- ☆33Updated 8 months ago
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Spider or repeater to find all links.☆11Updated 4 years ago
- ☆30Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago