GitHub Trends
10.3K subscribers
15.4K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#go #attack_surfaces #dns #enumeration #go #golang #information_gathering #maltego #network_security #osint #osint_reconnaissance #owasp #recon #subdomain

OWASP Amass is a tool that helps you find and map all the parts of a company's online presence, like websites, servers, and other internet-connected assets. It uses various techniques such as checking APIs, certificates, DNS records, and web archives to gather this information. This tool is useful because it gives you a complete picture of your company's attack surface, helping you identify potential security risks and protect your assets better. You can install it easily using prebuilt packages, Docker, or by compiling it from source code. The community supports it actively, and there are many resources available to help you get started and troubleshoot any issues.

https://github.com/owasp-amass/amass
👍2
#python #blueteam #discovery #emails #information_gathering #osint #python #recon #reconnaissance #redteam #subdomain_enumeration

theHarvester is a free, easy-to-use tool that helps you gather public information about a domain, such as emails, subdomains, IPs, and URLs, from many online sources like search engines and databases. It is useful during security testing to understand a company’s external exposure and find potential vulnerabilities. You can run it with Python and it supports features like DNS brute forcing and taking screenshots of found subdomains. Using theHarvester helps you quickly collect valuable data for cybersecurity assessments, making your research more efficient and thorough.

https://github.com/laramies/theHarvester
1
#typescript #investigation #osint #python #recon

Flowsint is a free, open-source tool for OSINT investigations that visualizes data like domains, IPs, emails, phones, crypto wallets, and websites as interactive graphs to spot hidden links fast. Install easily with Docker and Make via git clone and "make prod," then run locally at localhost:5173 for full privacy—all data stays on your machine. With 30+ auto-enrichers (e.g., subdomain scans, WHOIS, breach checks), it chains tasks to automate deep recon, saving hours on manual work and revealing patterns for cybersecurity, journalism, or fraud probes ethically.

https://github.com/reconurge/flowsint