Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for osint penetration testing tools
osint
x
penetration-testing-tools
x
13 search results found
Sonarsearch
⭐
621
A rapid API for the Project Sonar dataset
Xurlfind3r
⭐
485
A command-line interface (CLI) based passive URLs discovery utility. It is designed to efficiently identify known URLs of given domains by tapping into a multitude of curated online passive sources.
Dfw1n Osint
⭐
174
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Xsubfind3r
⭐
92
A command-line interface (CLI) based passive subdomain discovery utility. It is designed to efficiently identify known subdomains of given domains by tapping into a multitude of curated online passive sources.
Xposedornot
⭐
87
XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.
Enumerepo
⭐
60
List all public repositories for (valid) GitHub usernames
Htkit
⭐
41
Information Gathering Simplified.
Attacksurfacemanagement
⭐
33
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Python Security Tool Database
⭐
29
Solid Python toolkit for those in the security industry. Some by me, most by smarter people.
Netlas Scripts
⭐
23
Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test in a semi-automatic mode: collect all the domains and IP addresses associated with the target and save the responses received after contacting these hosts in HTML format. Over time, new scripts will appear here.
Dseeker
⭐
12
Domain Seeker
Yass
⭐
11
YASS (Yet Another Subdomainer Software) is a plugin-powered search engine based subdomainer.
Webpwn
⭐
5
Cracking the Lenses of Perimeter Penetrationtests
1-13 of 13 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.