recon-ng

Reconnaissance tool

A web-based open source reconnaissance framework designed to efficiently gather information from publicly available sources.

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

GitHub

4k stars
112 watching
644 forks
Language: Python
last commit: 22 days ago
Linked from 2 awesome lists


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
ivre/ivre A framework for building custom network reconnaissance tools and services. 3,481
epi052/recon-pipeline An automated reconnaissance tool for vulnerability scanning and identification. 428
ekultek/zeus-scanner An advanced reconnaissance utility designed to simplify web application reconnaissance 959
datasploit/datasploit Automated reconnaissance tool for gathering and correlating information about individuals, organizations, and domains. 3,032
s0md3v/recondog An all-in-one reconnaissance tool for gathering information about web targets 1,814
blacklanternsecurity/bbot A multipurpose scanner built to automate reconnaissance, bug bounty, and assembly security testing 5,289
mikaelkall/massrecon A tool for automating reconnaissance and service enumeration in cybersecurity engagements. 57
smicallef/spiderfoot Automates information gathering and analysis from various data sources to support threat intelligence and cybersecurity efforts 13,156
ronin-rb/ronin-recon A tool for performing reconnaissance of networks and assets by discovering and scanning them 34
codingo/reconnoitre Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. 2,110
outflanknl/recon-ad An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. 316
evyatarmeged/raccoon A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks 3,091
jofpin/trape A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks 8,116
opennhp/opennhp A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. 13,515
reconinfosec/adversary-emulation-map Creates an interactive visualization of an adversary emulation plan 16