recon-ng
Reconnaissance tool
A web-based open source reconnaissance framework designed to efficiently gather information from publicly available sources.
Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
4k stars
112 watching
657 forks
Language: Python
last commit: 3 months ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
ivre/ivre | A framework for building custom network reconnaissance tools and services. | 3,561 |
epi052/recon-pipeline | An automated reconnaissance tool for vulnerability scanning and identification. | 429 |
ekultek/zeus-scanner | An advanced reconnaissance utility designed to simplify web application reconnaissance | 964 |
datasploit/datasploit | Automated reconnaissance tool for gathering and correlating information about individuals, organizations, and domains. | 3,049 |
s0md3v/recondog | An all-in-one reconnaissance tool for gathering information about web targets | 1,825 |
blacklanternsecurity/bbot | Automates reconnaissance and vulnerability scanning of internet targets | 7,343 |
mikaelkall/massrecon | A tool for automating reconnaissance and service enumeration in cybersecurity engagements. | 56 |
smicallef/spiderfoot | Automates information gathering and analysis from various data sources to support threat intelligence and cybersecurity efforts | 13,364 |
ronin-rb/ronin-recon | A tool for performing reconnaissance of networks and assets by discovering and scanning them | 34 |
codingo/reconnoitre | Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,124 |
outflanknl/recon-ad | An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. | 316 |
evyatarmeged/raccoon | A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks | 3,105 |
jofpin/trape | A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks | 8,157 |
opennhp/opennhp | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
reconinfosec/adversary-emulation-map | Creates an interactive visualization of an adversary emulation plan | 16 |