Repository navigation
Reconnaissance
Reconnaissance refers to the process of gathering information about a target system, network, or organization, typically before launching an attack. The goal of recon is to understand the target's vulnerabilities, systems, and defenses to increase the likelihood of a successful breach or to defend a network by identifying its weak points.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
In-depth attack surface mapping and asset discovery
E-mails, subdomains and names Harvester - OSINT
OneForAll是一款功能强大的子域收集工具
The recursive internet scanner for hackers. 🧡
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
HTTP parameter discovery suite.
ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Automation for internal Windows Penetrationtest / AD-Security
A collection of custom security tools for quick needs.
A collection of awesome one-liner scripts especially for bug bounty tips.
Quickly discover exposed hosts on the internet using multiple search engines.
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network