You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A command-line utility designed to help you discover URLs for a given domain in a simple, efficient way. It works by gathering information from a variety of passive sources, meaning it doesn't interact directly with the target but instead gathers data that is already publicly available.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
A command-line interface (CLI) based utility to recursively crawl webpages. It is designed to systematically browse webpages' URLs and follow links to discover linked webpages' URLs.
A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security penetration testing and researches.
The Passive Company Scanner is a passive vulnerability scanning tool. By entering a company's name, it identifies associated IP addresses and gathers information on open ports, vulnerabilities, and more. It uses non-invasive techniques to map the attack surface without directly interacting with the targets.
RiskIntel is a powerful Python script designed to assist penetration testers and security professionals in performing external threat reconnaissance and threat modeling. By leveraging multiple online resources, RiskIntel helps identify potential risks and vulnerabilities associated with a given domain.
HolyScan is a robust Python script designed to assist network administrators and security professionals in scanning ports and services on networked devices. By performing comprehensive scans, HolyScan helps identify open ports and running services, providing crucial insights into network security and potential vulnerabilities.
CryptoCat is a robust Python script created to help penetration testers and security professionals assess the effectiveness of Endpoint Detection and Response (EDR) solutions within an organization. By simulating ransomware attacks, CryptoCat evaluates how well an EDR system detects and responds to file encryption threats.