Search the Community
Showing results for tags '(osint)'.
-
Mr.Holmes is a information gathering tool (OSINT). The main purpose is to gain information about domains,username and phone numbers with the help of public source avaiable on the internet also it use the google dorks attack for specific researchers. It also use proxies for make your requests completley anonymous and a WhoIS Api for getting more information about a domain. DISCLAIMER This Tool is Not 100% Precise so it can fail somtimes. Also this tool is made for educational and research purposes only..use it wisely. [hide][Hidden Content]]
-
- 1
-
- mr.holmes
- information
-
(and 3 more)
Tagged with:
-
𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 can be used by Infosec Researchers, Penetration Testers, Bug Hunters to find deep information, more assets, WAF/CDN bypassed IPs, Internal/External Infra, Publicly exposed leaks and many more about their target. Shodan Premium API key is required to use this automation. Output from the 𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is displayed to the screen and saved to files/directories. Features Powerful and flexible results via Shodan Dorks SSL SHA1 checksum/fingerprint Search Only hit In-Scope IPs Verify each IP with SSL/TLS certificate issuer match RegEx Provide Out-Of-Scope IPs Find out all ports including well known/uncommon/dynamic Grab all targets vulnerabilities related to CVEs Banner grab for each IP, Product, OS, Services & Org etc. Grab favicon Icons Generate Favicon Hash using python3 mmh3 Module Favicon Technology Detection using nuclei custom template ASN Scan BGP Neighbour IPv4 & IPv6 Profixes for ASN Interesting Leaks like Indexing, NDMP, SMB, Login, SignUp, OAuth, SSO, Status 401/403/500, VPN, Citrix, Jfrog, Dashboards, OpenFire, Control Panels, Wordpress, Laravel, Jetty, S3 Buckets, Cloudfront, Jenkins, Kubernetes, Node Exports, Grafana, RabbitMQ, Containers, GitLab, MongoDB, Elastic, FTP anonymous, Memcached, DNS Recursion, Kibana, Prometheus, Default Passwords, Protected Objects, Moodle, Spring Boot, Django, Jira, Ruby, Secret Key and many more... [hide][Hidden Content]]
-
ReconSpider ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources. ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters and Cyber Crime Investigators to find deep information about their target. ReconSpider aggregate all the raw data, visualize it on a dashboard and facilitate alerting and monitoring on the data. Recon Spider also combines the capabilities of Wave, Photon and Recon Dog to do a comprehensive enumeration of attack surface. [hide][Hidden Content]]
-
- reconspider
- v1.0.7
-
(and 6 more)
Tagged with:
-
Maryam OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular framework based on the Recon-ng core and written in Python. If you want Extracts Emails, Docs, Subdomains, Social networks from search engines Extracts Links, CSS and JS files, CDN links, Emails, Keywords from Web Source Find and Brute force DNS, TLD and important directs Crawl Web Pages and search your RegExp Identify WebApps, WAF, Interesting and important files Tools OSINT dns_search Search in the search engines and other sources for find DNS. email_search Search in search engines for find emails. docs_search Search in engines for find related documents. onion_search onion_search is to create the premier search engine for services residing on the Tor anonymity network. godork Search your dork in the google and get result social_nets Search for find usernames in social networks. crawler Crawl web pages for find links, JS Files, CSS files, Comments And everything else interesting with thread supporting FOOTPRINT crawl_pages Search to find keywords, emails, usernames, errors, meta tags and regex on the page/pages dbrute DNS brute force attack with thread supporting fbrute File/Directory brute force attack with thread supporting tldbrute TLD brute force attack with thread supporting waf Identify web application firewalls. It can detect over 200 firewall wapps Web fingerprinting to identify the applications used with over 1000 pyload. interest_files Search hosts for interesting files in predictable locations and brute force it. entry_points Crawl web pages for find entry points(inputs, urls with param) SEARCH google Google.com search metacrawler Metacrawler.com search yippy Yippy.com search crt Crt.sh search carrot2 carrot2.org search bing bing.com search twitter twitter.com search Linkedin linkedin.com search Changelog v1.4.7 Add three new source to find hostnames [hide][Hidden Content]]