SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
-
Updated
Nov 15, 2024 - Python
Reconnaissance refers to the process of gathering information about a target system, network, or organization, typically before launching an attack. The goal of recon is to understand the target's vulnerabilities, systems, and defenses to increase the likelihood of a successful breach or to defend a network by identifying its weak points.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
In-depth attack surface mapping and asset discovery
E-mails, subdomains and names Harvester - OSINT
OneForAll是一款功能强大的子域收集工具
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
A recursive internet scanner for hackers.
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Next generation web scanner
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
HTTP parameter discovery suite.
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Automation for internal Windows Penetrationtest / AD-Security
A collection of custom security tools for quick needs.
A collection of awesome one-liner scripts especially for bug bounty tips.
Quickly discover exposed hosts on the internet using multiple search engines.
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Striker is an offensive information and vulnerability scanner.