Showing 21-40 of 51 projects
An open-source OSINT framework for gathering information about IP addresses, emails, websites, and organizations.
A Python tool that can discover hidden IP addresses behind Cloudflare using misconfigured DNS and old database records.
An OSINT framework and package manager for security researchers and bug bounty hunters.
Sudomy is a subdomain enumeration tool for bug hunting and pentesting, providing automated reconnaissance.
Striker is an offensive information and vulnerability scanner for security professionals.
A collection of OSINT tools for information gathering, cybersecurity, and more.
ReconDog is a Python-based reconnaissance tool for information gathering and vulnerability detection.
A highly customizable and extensible automated security scanning engine for red teams
A comprehensive network reconnaissance and analysis tool for security professionals and network engineers
A repository providing a list of the top 25 vulnerability parameters for security researchers and bug bounty hunters.
A recon tool that allows searching on URLs exposed via shortener services for security research.
GooFuzz is a tool to perform fuzzing with an OSINT approach, enumerating targets without leaving evidence.
A semi-automated tool for rapidly searching public GitHub data for sensitive secrets and information leaks.
A command-line tool for visualizing Erlang and Elixir node metrics and performance.
A reconnaissance tool that utilizes various techniques to expedite initial information gathering on target organizations.
An open-source OSINT tool for recon and security research without API keys
A collection of Erlang functions and scripts to debug applications in production.
A fast, open-source GitHub recon tool that scans for leaked secrets across all of GitHub.
An advanced Python tool for email reconnaissance and cybersecurity research.
A Python-based tool for automating favicon-based reconnaissance during bug bounty and penetration testing.
Get weekly updates on trending AI coding tools and projects.