Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security recon
recon
x
security
x
84 search results found
Reconftw
⭐
5,204
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Whatweb
⭐
5,096
Next generation web scanner
Webhackersweapons
⭐
3,555
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Pentest Tools
⭐
2,652
A collection of custom security tools for quick needs.
Sn0int
⭐
1,749
Semi-automatic OSINT framework and package manager
Reconspider
⭐
1,729
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Redteam Offensivesecurity
⭐
1,630
Tools & Interesting Things for RedTeam Ops
Urlhunter
⭐
1,384
a recon tool that allows searching on URLs that are exposed via shortener services
Gitgot
⭐
1,384
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Sx
⭐
1,357
🖖 Fast, modern, easy-to-use network scanner
X8
⭐
1,344
Hidden parameters discovery suite
Cariddi
⭐
1,228
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Metabigor
⭐
1,087
OSINT tools and more but without API ke
Inventory
⭐
1,019
Asset inventory of over 800 public bug bounty programs.
Leaky Paths
⭐
746
A collection of special paths linked to common internal paths, known misconfigurations, juicy APIs ..etc. It could be used as a part of web content discovery, to scan passively for high-quality endpoints and quick-wins.
Scilla
⭐
682
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Wordlists
⭐
622
Infosec Wordlists and more.
Aiodnsbrute
⭐
579
Python 3.5+ DNS asynchronous brute force utility
Natlas
⭐
565
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Aort
⭐
556
All in One Recon Tool for Bug Bounty
Siem
⭐
489
SIEM Tactics, Techiques, and Procedures
Meerkat
⭐
407
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Ntlmrecon
⭐
397
Enumerate information from NTLM authentication enabled web endpoints 🔎
Pulsar
⭐
396
Network footprint scanner platform. Discover domains and run your custom checks periodically.
Android Security Exploits Youtube Curriculum
⭐
357
🔓A curated list of modern Android exploitation conference talks.
Docker Onion Nmap
⭐
322
Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Megplus
⭐
301
Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
Second Order
⭐
295
Second-order subdomain takeover scanner
Reconnote
⭐
274
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Theo
⭐
263
Ethereum recon and exploitation tool.
Csprecon
⭐
248
Discover new target domains using Content Security Policy
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Porch Pirate
⭐
215
Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitation of API endpoints and secrets committed to workspaces, collections, requests, users and teams. Porch Pirate can be used as a client or be incorporated into your own applications.
Mksub
⭐
204
Generate tens of thousands of subdomain combinations in a matter of seconds
Bbrecon
⭐
179
Python library and CLI for the Bug Bounty Recon API
Intrec Pack
⭐
164
Intelligence and Reconnaissance Package/Bundle installer.
Autosetup
⭐
162
Auto setup is a bash script compatible with Debian based distributions to install and setup necessary programs.
Mkpath
⭐
154
Make URL path combinations using a wordlist
Favirecon
⭐
149
Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
Web_hacking
⭐
135
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Goverview
⭐
119
goverview - Get an overview of the list of URLs
Webstor
⭐
119
A script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
Insiders
⭐
111
Archive of Potential Insider Threats
Chronos
⭐
98
Extract pieces of info from a web page's Wayback Machine history
Vulnsearch
⭐
88
A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from books, videos, articles and own experience with bug bounty hunting / web and network hacking
Vinifera
⭐
87
A GitHub recon/monitoring tool for finding internal leaks belonging to your organisation.
Sharingan
⭐
84
Offensive Security recon tool
Bugradar
⭐
72
Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.
Offensiveclouddistribution
⭐
62
Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.
Enumerepo
⭐
60
List all public repositories for (valid) GitHub usernames
Targets
⭐
57
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Github Logs
⭐
53
Extracting OSINT Insights from 15TB of GitHub Event Logs
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Mapperplus
⭐
51
MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.
Hoper
⭐
49
Security tool to trace URL's jumps across the rel links to obtain the last URL
Cloud
⭐
47
Monitoring the Cloud Landscape
Reconbf
⭐
44
Recon system hardening scanner
Webrecon
⭐
41
Automated Web Recon Shell Scripts
Buggpt Tools
⭐
34
AI Generated Tools/one-off-scripts primarily for Bug Bounties
Burp Ntlm Challenge Decoder
⭐
33
Burp extension to decode NTLM SSP headers and extract domain/host information
Dirbpy
⭐
33
This is the new version of dirb in python
Mgwls
⭐
31
Combine words from two wordlist files and concatenate them with an optional delimiter
Goblob
⭐
30
A fast enumeration tool for publicly exposed Azure Storage blobs.
Flydns
⭐
24
Related subdomains finder
Unhidens
⭐
24
Small DNS Recon utility, allows you to obtain some useful info about NS-servers placed behind relays, firewalls, etc.
Diffjs
⭐
23
Tool for monitoring changes in javascript files on WebApps for reconnaissance.
Smog
⭐
22
A semi-automatic osint/recon framework.
Active Ip
⭐
21
🕵️♂️🔍 A tool with several scanning techniques that extracts live IP addresses from a list of IP addresses or CIDR notations.
Urlrecon
⭐
20
📝 urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Server Fingerprint * IP geolocation of the server
Tools
⭐
15
Darkbit Cloud Security Tools
Hacker Scoper
⭐
14
Automagically filter URLs with Bug Bounty program scope rules scraped from the internet.
Arsenal
⭐
14
Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties
Searcher
⭐
13
Run a base query (plus optional add-ons) through ask, bing, brave, duck duck go, yahoo, and yandex.
Scripts
⭐
13
Handy scripts and one-liners to make life easier
Recon X
⭐
13
Advanced Reconnaissance tool to enumerate attacking surface of the target.
Slime
⭐
11
Slime是一个组合众多优秀安全工具的漏扫软件,它将目光集中在安全工具的组合上,而不是自己实现漏扫的
Awesome Recon Tools
⭐
9
A compiled list of tools for reconnaissance and footprinting
Hunterseye
⭐
9
HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains. The primary goal is to streamline and expedite the process of monitoring newly registered subdomains and SSL certificates related to specified target domains.
Ownbucket
⭐
8
A Python based Recon Tool to search for Storage Buckets
Ruby Recon
⭐
6
A recon tool using ruby-nmap
Ronin Db Activerecord
⭐
6
ActiveRecord backend for the Ronin Database
Apkaleidoscope
⭐
5
Project moved to - https://github.com/d78ui98/APKDeepLens
Httpr
⭐
5
Automated Dork scanner designed for Hunters
Related Searches
Security Vulnerabilities (11,849)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,959)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-84 of 84 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.