Reconflow
This is all in one tool for gathering reconnaissance information about a target without the hassle of installing multiple tools and their dependencies & also presents you the results to your telegram chat.
https://github.com/adarshshetty18/reconflow
#recon #bugbounty #telegram
This is all in one tool for gathering reconnaissance information about a target without the hassle of installing multiple tools and their dependencies & also presents you the results to your telegram chat.
https://github.com/adarshshetty18/reconflow
#recon #bugbounty #telegram
GitHub
GitHub - adarshshetty18/reconflow: Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration…
Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test - adarshshetty18/reconflow
Karma v2
Passive Open Source Intelligence Automated Reconnaissance Framework
https://github.com/Dheerajmadhukar/karma_v2
#osint #recon
Passive Open Source Intelligence Automated Reconnaissance Framework
https://github.com/Dheerajmadhukar/karma_v2
#osint #recon
GitHub
GitHub - Dheerajmadhukar/karma_v2: ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework) - Dheerajmadhukar/karma_v2
Information Gathering and Scanning for Sensitive Information
https://0xjoyghosh.medium.com/information-gathering-scanning-for-sensitive-information-reloaded-6ff3455e0d4e
#OSINT #Recon
https://0xjoyghosh.medium.com/information-gathering-scanning-for-sensitive-information-reloaded-6ff3455e0d4e
#OSINT #Recon
Medium
Information Gathering&scanning for sensitive information[ Reloaded ]
Testing Web-Application/Network , Information Gathering is important before we test for vulnerability on the target?
Recon — Horizontal Enumeration
https://aaryanapex.medium.com/bug-bounty-methodology-horizontal-enumeration-89f7cd172e6e
#osint #recon #enumeration
https://aaryanapex.medium.com/bug-bounty-methodology-horizontal-enumeration-89f7cd172e6e
#osint #recon #enumeration
Medium
Bug Bounty Methodology — Horizontal Enumeration
While performing a security assessment our main goal is to map out all the domains owned by a single entity. This means knowing all the…
o365recon
Script to retrieve information via O365 and AzureAD with a valid cred.
https://github.com/nyxgeek/o365recon
#azure #recon #tools
Script to retrieve information via O365 and AzureAD with a valid cred.
https://github.com/nyxgeek/o365recon
#azure #recon #tools
KnockOutlook
KnockOutlook is a C# project that interacts with Outlook's COM object in order to perform a number of operations useful in red team engagements.
https://github.com/eksperience/KnockOutlook
#exchange #outlook #com #recon
KnockOutlook is a C# project that interacts with Outlook's COM object in order to perform a number of operations useful in red team engagements.
https://github.com/eksperience/KnockOutlook
#exchange #outlook #com #recon
GitHub
GitHub - eksperience/KnockOutlook: A little tool to play with Outlook
A little tool to play with Outlook. Contribute to eksperience/KnockOutlook development by creating an account on GitHub.
🕵️ OSINT Collection
Collection of 4000+ OSINT resources
https://metaosint.github.io/table
#osint #recon #collection
Collection of 4000+ OSINT resources
https://metaosint.github.io/table
#osint #recon #collection
👍6
🔒 TLSX
Collection of additional assets of a target CIDR/IP/HOST from TLS certificates.
Features:
— Fast And fully configurable TLS Connection
— Multiple Modes for TLS Connection
— Multiple TLS probes
— Auto TLS Fallback for older TLS version
— Pre Handshake TLS connection (early termination)
— Customizable Cipher / SNI / TLS selection
— TLS Misconfigurations
— HOST, IP, URL and CIDR input
— STD IN/OUT and TXT/JSON output
Example:
#recon #tls #grabber #tools
Collection of additional assets of a target CIDR/IP/HOST from TLS certificates.
Features:
— Fast And fully configurable TLS Connection
— Multiple Modes for TLS Connection
— Multiple TLS probes
— Auto TLS Fallback for older TLS version
— Pre Handshake TLS connection (early termination)
— Customizable Cipher / SNI / TLS selection
— TLS Misconfigurations
— HOST, IP, URL and CIDR input
— STD IN/OUT and TXT/JSON output
Example:
tlsx -u 209.133.79.0/24 -san -cn -silent -resp-only | dnsx -silent | httpx | nucleihttps://github.com/projectdiscovery/tlsx
#recon #tls #grabber #tools
👍5👎1
🤖 BBOT: OSINT automation for hackers
This tools is capable of executing the entire OSINT process in a single command, including subdomain enumeration, port scanning, web screenshots (with its gowitness module), vulnerability scanning (with nuclei), and much more. BBOT currently has over 50 modules and counting.
Features:
— Recursive;
— Graphing;
— Modular;
— Multi-Target;
— Automatic Dependencies;
— Smart Dictionary Attacks;
— Scope Distance;
— Easily Configurable via YAML.
Blog:
https://blog.blacklanternsecurity.com/p/bbot
Source:
https://github.com/blacklanternsecurity/bbot
#external #recon #osint #redteam #bugbounty
This tools is capable of executing the entire OSINT process in a single command, including subdomain enumeration, port scanning, web screenshots (with its gowitness module), vulnerability scanning (with nuclei), and much more. BBOT currently has over 50 modules and counting.
Features:
— Recursive;
— Graphing;
— Modular;
— Multi-Target;
— Automatic Dependencies;
— Smart Dictionary Attacks;
— Scope Distance;
— Easily Configurable via YAML.
Blog:
https://blog.blacklanternsecurity.com/p/bbot
Source:
https://github.com/blacklanternsecurity/bbot
#external #recon #osint #redteam #bugbounty
👍9🔥2
🔎 Radar
Tiny tool to identify technologies and services used by domains through their DNS footprints
🔗 Source:
https://github.com/Elite-Security-Systems/radar
#pentest #discovery #recon
Tiny tool to identify technologies and services used by domains through their DNS footprints
🔗 Source:
https://github.com/Elite-Security-Systems/radar
#pentest #discovery #recon
1👍21❤2