| smicallef/spiderfoot |
11,035 |
|
0 |
0 |
about 2 years ago |
0 |
|
162 |
mit |
Python |
| SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. |
| infosecn1nja/Red-Teaming-Toolkit |
8,230 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
gpl-3.0 |
|
| This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter. |
| yogeshojha/rengine |
6,446 |
|
0 |
0 |
about 2 years ago |
0 |
|
105 |
gpl-3.0 |
Python |
| reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless. |
| giuliacassara/awesome-social-engineering |
3,830 |
|
0 |
0 |
about 3 years ago |
0 |
|
3 |
|
|
| A curated list of awesome social engineering resources. |
| snooppr/snoop |
2,530 |
|
0 |
0 |
about 2 years ago |
0 |
|
1 |
other |
Python |
| Snoop — инструмент разведки на основе открытых данных (OSINT world) |
| redhuntlabs/Awesome-Asset-Discovery |
1,749 |
|
0 |
0 |
over 2 years ago |
0 |
|
8 |
cc0-1.0 |
|
| List of Awesome Asset Discovery Resources |
| Ph055a/OSINT_Collection |
1,728 |
|
0 |
0 |
over 2 years ago |
0 |
|
5 |
|
|
| Maintained collection of OSINT related resources. (All Free & Actionable) |
| edoardottt/cariddi |
1,228 |
|
0 |
0 |
about 2 years ago |
15 |
June 09, 2023 |
8 |
gpl-3.0 |
Go |
| Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more |
| danieldurnea/FBI-tools |
1,153 |
|
0 |
0 |
about 2 years ago |
0 |
|
2 |
|
|
| 🕵️ OSINT Tools for gathering information and actions forensics 🕵️ |
| m3n0sd0n4ld/GooFuzz |
1,119 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
gpl-3.0 |
Shell |
| GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking). |