recon-ng

Reconnaissance tool

A web-based open source reconnaissance framework designed to efficiently gather information from publicly available sources.

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

GitHub

4k stars
112 watching
657 forks
Language: Python
last commit: 3 months ago
Linked from 2 awesome lists


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
ivre/ivre A framework for building custom network reconnaissance tools and services. 3,561
epi052/recon-pipeline An automated reconnaissance tool for vulnerability scanning and identification. 429
ekultek/zeus-scanner An advanced reconnaissance utility designed to simplify web application reconnaissance 964
datasploit/datasploit Automated reconnaissance tool for gathering and correlating information about individuals, organizations, and domains. 3,049
s0md3v/recondog An all-in-one reconnaissance tool for gathering information about web targets 1,825
blacklanternsecurity/bbot Automates reconnaissance and vulnerability scanning of internet targets 7,343
mikaelkall/massrecon A tool for automating reconnaissance and service enumeration in cybersecurity engagements. 56
smicallef/spiderfoot Automates information gathering and analysis from various data sources to support threat intelligence and cybersecurity efforts 13,364
ronin-rb/ronin-recon A tool for performing reconnaissance of networks and assets by discovering and scanning them 34
codingo/reconnoitre Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. 2,124
outflanknl/recon-ad An Active Directory reconnaissance tool that uses ADSI and reflective DLLs to enumerate domain information and query user, group, and computer objects. 316
evyatarmeged/raccoon A high-performance tool for reconnaissance and vulnerability scanning of web applications and networks 3,105
jofpin/trape A tool for tracking and analyzing online activity to identify vulnerabilities in social engineering attacks 8,157
opennhp/opennhp A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers 13,520
reconinfosec/adversary-emulation-map Creates an interactive visualization of an adversary emulation plan 16