[sc name=”ad_1″] A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints...
Category - Information Gathering
Information gathering is the most time-consuming and laborious phase of the attack cycle but is often a major determinant of the success or failure of the engagement.
[sc name=”ad_1″] ParamSpider : Parameter miner for humans. Key Features : Finds parameters from web archives of the entered domain. Finds...
[sc name=”ad_1″] Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to...
[sc name=”ad_1″] A typical search engine dork scanner that scrapes search engines with queries that you provide in order to find vulnerable URLs...
[sc name=”ad_1″] Shhgit finds secrets and sensitive files across GitHub code and Gists committed in near real time by listening to the GitHub...
[sc name=”ad_1″] Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters...
[sc name=”ad_1″] BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow...
[sc name=”ad_1″] Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to...
[sc name=”ad_1″] Sherlock, a powerful command line tool provided by Sherlock Project, can be used to find usernames across many social networks. It...
All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers. Scans That You Can Perform Using...