xFreed0m / OSINTer
bash script to prepare Debian machines for OSINT use
☆11Updated 5 years ago
Alternatives and similar repositories for OSINTer
Users that are interested in OSINTer are comparing it to the libraries listed below
Sorting:
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆13Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- Free Email Providers☆10Updated last year
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Various exploits☆10Updated 8 years ago
- ☆14Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- first commit☆10Updated 8 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆28Updated 7 years ago
- Notes on offensive training☆16Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 10 months ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago