One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.
☆65Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for One-Liner-OSINT
Users that are interested in One-Liner-OSINT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆100Jan 25, 2026Updated 2 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆25Mar 31, 2025Updated 11 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆59Jan 25, 2026Updated 2 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated last month
- Phishing scams are more rampant than ever — and I wanted to do something about it. Over the last few weeks, I’ve been working on a proje…☆17Sep 8, 2025Updated 6 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆38Jan 26, 2026Updated last month
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 2 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Mar 8, 2026Updated 2 weeks ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- Automate script for wifi hacking☆23Mar 15, 2024Updated 2 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆47Dec 19, 2025Updated 3 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated 2 months ago
- ☆16Jun 28, 2025Updated 8 months ago
- Track GitHub user and repository activity in real time with instant notifications☆44Feb 7, 2026Updated last month
- Docker install for edex-ui☆20Jun 7, 2019Updated 6 years ago
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆46Updated this week
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆164Feb 24, 2026Updated last month
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆67Mar 31, 2025Updated 11 months ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Admin for☆16Jun 3, 2018Updated 7 years ago
- A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and int…☆20Jul 4, 2025Updated 8 months ago
- All Exploit List Made By Me☆17Apr 7, 2025Updated 11 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- A Sublime Text 3 syntax highlighting plugin for email message headers.☆32Feb 19, 2017Updated 9 years ago
- Dracula OS is a Linux operating system meticulously designed for OSINT (Open Source Intelligence) and Cyber Intelligence missions.☆90Nov 24, 2025Updated 4 months ago
- XSS vulnerability scanner written in Python☆16Oct 28, 2022Updated 3 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆12May 25, 2025Updated 10 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆91Jan 25, 2026Updated 2 months ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- Here are some cool and some unpublished Dorks☆82Jan 17, 2025Updated last year
- penGUI take cure of eggs!☆11Jun 22, 2024Updated last year
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Real-time and historical 3D visualization of ADS-B aircraft data with 7 visual themes, mini radar, and interactive controls☆28Mar 15, 2026Updated last week