🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.

Overview

Most Advanced Open Source Intelligence (OSINT) Framework

ReconSpider

ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources.

ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters and Cyber Crime Investigators to find deep information about their target.

ReconSpider aggregate all the raw data, visualize it on a dashboard and facilitate alerting and monitoring on the data.

Recon Spider also combines the capabilities of Wave, Photon and Recon Dog to do a comprehensive enumeration of attack surface.

Why it's called ReconSpider ?

ReconSpider = Recon + Spider

Recon = Reconnaissance

Reconnaissance is a mission to obtain information by various detection methods, about the activities and resources of an enemy or potential enemy, or geographic characteristics of a particular area.

Spider = Web crawler

A Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).

Table Of Contents

  1. Version (beta)
  2. Overview of the tool
  3. Mind Map (v1)
  4. License Information
  5. ReconSpider Banner
  6. Documentation
  7. Setting up the environment
  8. Updating API Keys
  9. Usage
  10. Contact
  11. Wiki & How-to Guide
  12. Updates

Version (beta)

ReconSpider   :     1.0.7

Overview of the tool:

  • Performs OSINT scan on a IP Address, Emails, Websites, Organizations and find out information from different sources.
  • Correlates and collaborate the results, show them in a consolidated manner.
  • Use specific script / launch automated OSINT for consolidated data.
  • Currently available in only Command Line Interface (CLI).

Mind Map (v1)

Check out our mind map to see visually organize information of this tool regarding api, services and techniques and more.

https://bhavsec.com/img/reconspider_map.png

License Information

ReconSpider and its documents are covered under GPL-3.0 (General Public License v3.0)

ReconSpider Banner

__________                               _________       __     ___            
\______   \ ____   ____  ____   ____    /   _____/_____ |__| __| _/___________
 |       _// __ \_/ ___\/  _ \ /    \   \_____  \\____ \|  |/ __ |/ __ \_  __ \
 |    |   \  ___/\  \__(  <_> )   |  \  /        \  |_> >  / /_/ \  ___/|  | \/
 |____|_  /\___  >\___  >____/|___|  / /_______  /   __/|__\____ |\___  >__|   
        \/     \/     \/           \/          \/|__|           \/    \/       



ENTER 0 - 13 TO SELECT OPTIONS

1.  IP                           Enumerate  information  from  IP Address
2.  DOMAIN                       Gather  information  about  given DOMAIN
3.  PHONENUMBER                  Gather  information  about   Phonenumber
4.  DNS MAP                      Map DNS  records associated  with target
5.  METADATA                     Extract all metadata of  the  given file
6.  REVERSE IMAGE SEARCH         Obtain domain name or IP address mapping
7.  HONEYPOT                     Check if it's honeypot or a real  system
8.  MAC ADDRESS LOOKUP           Obtain information about give Macaddress
9.  IPHEATMAP                    Draw  out  heatmap  of  locations  of IP
10. TORRENT                      Gather torrent download  history  of  IP
11. USERNAME                     Extract Account info. from social  media
12. IP2PROXY                     Check whether  IP  uses  any VPN / PROXY
13. MAIL BREACH                  Checks given domain  has  breached  Mail
99. UPDATE                       Update ReconSpider to its latest version

0. EXIT                         Exit from  ReconSpider  to your terminal

Documentation

Installing and using ReconSpider is very easy. Installation process is very simple.

  1. Downloading or cloning ReconSpider github repository.
  2. Installing all dependencies.
  3. Setting up the Database.

Let's Begin !!

Setting up the environment

Step 1 - Cloning ReconSpider on your linux system.

In order to download ReconSpider simply clone the github repository. Below is the command which you can use in order to clone ReconSpider repository.

git clone https://github.com/bhavsec/reconspider.git

Step 2 - Make sure python3 and python3-pip is installed on your system.

You can also perform a check by typing this command in your terminal.

sudo apt install python3 python3-pip

Step 3 - Installing all dependencies.

Once you clone and check python installation, you will find directory name as reconspider. Just go to that directory and install using these commands:

cd reconspider
sudo python3 setup.py install

Step 4 - Setting up the Database.

IP2Proxy Database

https://lite.ip2location.com/database/px8-ip-proxytype-country-region-city-isp-domain-usagetype-asn-lastseen

Download database, extract it and move to reconspider/plugins/ directory.

Updating API Keys

APIs included in ReconSpider are FREE and having limited & restricted usage per month, Please update the current APIs with New APIs in setup.py file, and re-install once done to reflect the changes.

Warning: Not updating the APIs can result in not showing the expected output or it may show errors.

You need to create the account and get the API Keys from the following websites.

Usage

ReconSpider is very handy tool and easy to use. All you have to do is just have to pass values to parameter. In order to start ReconSpider just type:

python3 reconspider.py

1. IP

This option gathers all the information of given IP Address from public resources.

ReconSpider >> 1
IP >> 8.8.8.8

2. DOMAIN

This option gathers all the information of given URL Address and check for vulneribility.

Reconspider >> 2
HOST (URL / IP) >> vulnweb.com
PORT >> 443

3. PHONENUMBER

This option allows you to gather information of given phonenumber.

Reconspider >> 3
PHONE NUMBER (919485247632) >>

4. DNS MAP

This option allows you to map an organizations attack surface with a virtual DNS Map of the DNS records associated with the target organization.

ReconSpider >> 4
DNS MAP (URL) >> vulnweb.com

5. METADATA

This option allows you to extract all metadat of the file.

Reconspider >> 5
Metadata (PATH) >> /root/Downloads/images.jpeg

6. REVERSE IMAGE SEARCH

This option allows you to obtain information and similar image that are available in internet.

Reconspider >> 6
REVERSE IMAGE SEARCH (PATH) >> /root/Downloads/images.jpeg
Open Search Result in web broser? (Y/N) : y

7. HONEYPOT

This option allows you to identify honeypots! The probability that an IP is a honeypot is captured in a "Honeyscore" value that can range from 0.0 to 1.0

ReconSpider >> 7
HONEYPOT (IP) >> 1.1.1.1

8. MAC ADDRESS LOOKUP

This option allows you to identify Mac address details who is manufacturer, address, country, etc.

Reconspider >> 8
MAC ADDRESS LOOKUP (Eg:08:00:69:02:01:FC) >>

9. IPHEATMAP

This option provided you heatmap of the provided ip or single ip, if connect all the provided ip location with accurate Coordinator.

Reconspider >> 9

    1) Trace single IP
    2) Trace multiple IPs
OPTIONS >>

10. TORRENT

This option allows you to gathers history of Torrent download history.

Reconspider >> 10
IPADDRESS (Eg:192.168.1.1) >>

11. USERNAME

This option allows you to gathers account information of the provided username from social media like Instagram, Twitter, Facebook.

Reconspider >> 11

1.Facebook
2.Twitter
3.Instagram

Username >>

12. IP2PROXY

This option allows you to identify whether IP address uses any kind of VPN / Proxy to hide his identify.

Reconspider >> 12
IPADDRESS (Eg:192.168.1.1) >>

13. MAIL BREACH

This option allows you to identify all breached mail ID from given domain.

Reconspider >> 13
DOMAIN (Eg:intercom.io) >>

99. UPDATE

This option allows you to check for updates. If a newer version will available, ReconSpider will download and merge the updates into the current directory without overwriting other files.

ReconSpider >> 99
Checking for updates..

0. EXIT

This option allows you to exit from ReconSpider Framework to your current Operating System's terminal.

ReconSpider >> 0
Bye, See ya again..

Contact Developer

Do you want to have a conversation in private?

Twitter:            @bhavsec
Facebook:           fb.com/bhavsec
Instagram:          instagram.com/bhavsec
LinkedIn:           linkedin.com/in/bhavsec
Email:              [email protected]
Website:            bhavsec.com

ReconSpider Full Wiki and How-to Guide

Please go through the ReconSpider Wiki Guide for a detailed explanation of each and every option and feature.

Frequent & Seamless Updates

ReconSpider is under development and updates for fixing bugs. optimizing performance & new features are being rolled. Custom error handling is also not implemented, and all the focus is to create required functionality.

Special Thanks & Contributors

Comments
  • error using Phone number option

    error using Phone number option

    When using phone number option, Program Terminates when the user enters a number

    Traceback (most recent call last): File "reconspider.py", line 39, in from core import repl_prompt File "/home/srk/Tools/Osint/reconspider/core/init.py", line 1, in from .repl_prompt import * File "/home/srk/Tools/Osint/reconspider/core/repl_prompt.py", line 153, in repl() File "/home/srk/Tools/Osint/reconspider/core/repl_prompt.py", line 64, in repl Phonenumber(ph) File "/home/srk/Tools/Osint/reconspider/plugins/Phonenumber.py", line 17, in Phonenumber print("Number: "+get['number']) KeyError: 'number'

    duplicate Issue Fixed ✓ 
    opened by srkadia 5
  • Still error on phonenumber option

    Still error on phonenumber option

    Still showing this error...

    please fix this asap,

    Traceback (most recent call last): File "reconspider.py", line 39, in from core import repl_prompt File "/home/srk/Tools/Osint/reconspider/core/init.py", line 1, in from .repl_prompt import * File "/home/srk/Tools/Osint/reconspider/core/repl_prompt.py", line 153, in repl() File "/home/srk/Tools/Osint/reconspider/core/repl_prompt.py", line 64, in repl Phonenumber(ph) File "/home/srk/Tools/Osint/reconspider/plugins/Phonenumber.py", line 17, in Phonenumber print("Number: "+get['number']) KeyError: 'number'

    duplicate 
    opened by srkadia 4
  • Error when using Phone Number option

    Error when using Phone Number option

    Describe the bug Error when using Phone Number option

    To Reproduce Steps to reproduce the behavior:

    1. Run python3 reconspider.py
    2. Input '3' when prompted
    3. Input the phone number - PHONE NUMBER (919485247632) >> 919485247632
    4. See error :
    Reconspider >> 3
    PHONE NUMBER (919485247632) >> 919485247632
    [+] Fetching Phonenumber Details...
    
    Traceback (most recent call last):
      File "reconspider.py", line 39, in <module>
        from core import repl_prompt
      File "/root/reconspider/core/__init__.py", line 1, in <module>
        from .repl_prompt import *
      File "/root/reconspider/core/repl_prompt.py", line 153, in <module>
        repl()
      File "/root/reconspider/core/repl_prompt.py", line 64, in repl
        Phonenumber(ph)
      File "/root/reconspider/plugins/Phonenumber.py", line 17, in Phonenumber
        print("Number: "+get['number'])
    KeyError: 'number'
    

    Desktop (please complete the following information):

    • OS: Ubuntu 20.04 LTS
    • Terminal
    Issue Fixed ✓ 
    opened by TamojitSaha 3
  • Email breach not work. (hunter.io reach upper limited)

    Email breach not work. (hunter.io reach upper limited)

    When I type https://api.hunter.io/v2/domain-search?domain=google.com&api_key=9f189e87e011a1d2f3013ace7b14045dec60f62c

    It returns

    {
      "errors": [
        {
          "id": "too_many_requests",
          "code": 429,
          "details": "You've reached the limit for the number of searches per billing period included in your plan."
        }
      ]
    }
    
    opened by hwygold 2
  • installing issue

    installing issue

    Describe the bug A clear and concise description of what the bug is.

    To Reproduce Steps to reproduce the behavior:

    1. Go to '...'
    2. Click on '....'
    3. Scroll down to '....'
    4. See error

    Expected behavior A clear and concise description of what you expected to happen.

    Screenshots If applicable, add screenshots to help explain your problem.

    Desktop (please complete the following information):

    • OS: [e.g. iOS]
    • Browser [e.g. chrome, safari]
    • Version [e.g. 22]

    Smartphone (please complete the following information):

    • Device: [e.g. iPhone6]
    • OS: [e.g. iOS8.1]
    • Browser [e.g. stock browser, safari]
    • Version [e.g. 22]

    Additional context Add any other context about the problem here. While installing showing the wheel package is not available

    opened by Mrunknownrs 2
  • Domain ports fails

    Domain ports fails

    Describe the bug Port unavaible: 443 Reconspider >> 2 HOST (URL / IP) >> nor3d.no PORT >> 443 Invalid port - Available(80,443) HOST (URL / IP) >>

    To Reproduce Reconspider >> 2 HOST (URL / IP) >> nor3d.no PORT >> 443 Invalid port - Available(80,443) HOST (URL / IP) >>

    Desktop (please complete the following information):

    • OS: Kali Linux
    • 5.10.0-kali7-amd64 #1 SMP Debian 5.10.28-1kali1 (2021-04-12) x86_64 GNU/Linux Python 3.9.2
    Issue Fixed ✓ 
    opened by azzarin 2
  • no module named 'pip'

    no module named 'pip'

    When running the installation I get to the command "sudo python setup.py install" Once I run this command I get this error: Traceback (most recent call last): File "setup.py", line 3, in import pip ImportError: No module named pip Anyone know a fix?

    Issue Fixed ✓ 
    opened by SupremeERG 2
  • I dosen't know what is this but after installation of reconspider it is saying me this

    I dosen't know what is this but after installation of reconspider it is saying me this

    /data/data/com.termux/files/usr/lib/python3.9/site-packages/Pillow-8.0.1-py3.9-linux-armv7l.egg/PIL/Image.py:115: RuntimeWarning: The _imaging extension was built for another version of Pillow or PIL: Core version: None Pillow version: 8.0.1 Traceback (most recent call last): File "/data/data/com.termux/files/home/reconspider/reconspider.py", line 39, in from core import repl_prompt File "/data/data/com.termux/files/home/reconspider/core/init.py", line 1, in from .repl_prompt import * File "/data/data/com.termux/files/home/reconspider/core/repl_prompt.py", line 11, in from plugins.metadata import gps_analyzer File "/data/data/com.termux/files/home/reconspider/plugins/metadata.py", line 2, in from PIL import Image File "", line 259, in load_module File "/data/data/com.termux/files/usr/lib/python3.9/site-packages/Pillow-8.0.1-py3.9-linux-armv7l.egg/PIL/Image.py", line 97, in ImportError: The _imaging extension was built for another version of Pillow or PIL: Core version: None Pillow version: 8.0.1

    wontfix 
    opened by Sarthak232121 2
  • Requirements.txt is not found

    Requirements.txt is not found

    Describe the bug once install runs it seems to run into the error of 'requirements.txt is not found'

    To Reproduce Steps to reproduce the behavior:

    1. git clone it
    2. run the install.py
    3. See error

    Expected behavior requirements.txt to be found

    Screenshots image

    Desktop (please complete the following information):

    • OS: ParrotOS (up to date)
    • Browser: Firefox
    • Version: latest
    Issue Fixed ✓ 
    opened by DR3DL0RD 2
  • tool to consider

    tool to consider

    Is your feature request related to a problem? Please describe. info gathering is a bit slow, plus sometimes i face bugs with whois.

    Describe the solution you'd like You could use spyse API for most searches like DNS, IP, Port, Whois etc...

    Additional context They regularly scan the web and add all the data to own DB so you don't need to wait for the results.

    i hope it will help

    Issue Fixed ✓ 
    opened by Luci-d 2
  • Cannot search Whois

    Cannot search Whois

    Describe the bug Cannot search whois, picture attacted below I can see few errors while installation, could you explain what is it please :)? writing manifest file 'ReconSpider.egg-info\SOURCES.txt' installing library code to build\bdist.win32\egg running install_lib warning: install_lib: 'build\lib' does not exist -- no Python modules to install Installed d:\program files\python\lib\site-packages\click_plugins-1.1.1-py3.7.egg error: The 'click' distribution was not found and is required by shodan

    To Reproduce Steps to reproduce the behavior:

    1. Follow the installation in documentation

    Expected behavior Whois data will be shown below

    Screenshots image

    Desktop (please complete the following information):

    • OS: [windows]
    • Browser [chrome]
    • Version [10]
    opened by Thomas0921 2
  • Update urllib3 module version

    Update urllib3 module version

    Module version is required urllib3 1.26.13 but it is installing non-dependent module version urllib3 2.0.0a2

    error: urllib3 2.0.0a2 is installed but urllib3<1.27,>=1.21.1 is required by {'requests'}
    
    opened by RAJANAGORI 0
  • Issue running setup.py

    Issue running setup.py

    Describe the bug When i run the install command "python3 setup.py install" i get the following output

    /usr/lib/python3/dist-packages/setuptools/_distutils/dist.py:264: UserWarning: Unknown distribution option: 'console' warnings.warn(msg) error: Multiple top-level packages discovered in a flat-layout: ['core', 'plugins'].

    To avoid accidental inclusion of unwanted files or directories, setuptools will not proceed with this build.

    If you are trying to create a single distribution with multiple packages on purpose, you should not rely on automatic discovery. Instead, consider the following options:

    1. set up custom discovery (find directive with include or exclude)
    2. use a src-layout
    3. explicitly set py_modules or packages with a list of names.

    To find more information, look for “package discovery” on setup tools docs. reconspidererror

    To Reproduce Steps to reproduce the behavior:

    1. run "python3 setup.py install" without the quotes of course 2.) see message described above

    Expected behavior the install script to run without issue

    Screenshots see attached image

    Desktop (please complete the following information):

    • OS: Kali Linux
    • Browser Firefox
    • Version: 2022.3

    Additional context i apologize if this was already covered somewhere but i didn't see it, but if not then I'm hoping someone could lend some advice or suggestions my way for some help on this

    opened by highrider0602 1
  • header

    header

    Describe the bug When I launch the program, I receive these errors.

    usr/share/reconspider/plugins/webosint/crawler.py:150: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:168: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(r_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:172: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(sm_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:176: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(css_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:180: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(js_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:184: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(int_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:188: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(ext_total) is not 0: /usr/share/reconspider/plugins/webosint/crawler.py:192: SyntaxWarning: "is not" with a literal. Did you mean "!="? if len(img_total) is not 0:

    To Reproduce use the syntax to launch "python3 reconspider.py"

    Expected behavior To launch without errors

    Screenshots If applicable, add screenshots to help explain your problem.

    Desktop (please complete the following information): up to date kali

    Smartphone (please complete the following information): NA

    Additional context Add any other context about the problem here.

    opened by MattStr11 0
  • I have a problem with the instalation, this appears:

    I have a problem with the instalation, this appears:

    ┌──(kali㉿kali)-[~/reconspider] └─$ sudo python3 setup.py install /usr/local/lib/python3.10/distutils/dist.py:274: UserWarning: Unknown distribution option: 'console' warnings.warn(msg) running install running bdist_egg running egg_info writing ReconSpider.egg-info/PKG-INFO writing dependency_links to ReconSpider.egg-info/dependency_links.txt writing requirements to ReconSpider.egg-info/requires.txt writing top-level names to ReconSpider.egg-info/top_level.txt reading manifest file 'ReconSpider.egg-info/SOURCES.txt' adding license file 'LICENSE' writing manifest file 'ReconSpider.egg-info/SOURCES.txt' installing library code to build/bdist.linux-x86_64/egg running install_lib warning: install_lib: 'build/lib' does not exist -- no Python modules to install

    creating build/bdist.linux-x86_64/egg creating build/bdist.linux-x86_64/egg/EGG-INFO copying ReconSpider.egg-info/PKG-INFO -> build/bdist.linux-x86_64/egg/EGG-INFO copying ReconSpider.egg-info/SOURCES.txt -> build/bdist.linux-x86_64/egg/EGG-INFO copying ReconSpider.egg-info/dependency_links.txt -> build/bdist.linux-x86_64/egg/EGG-INFO copying ReconSpider.egg-info/requires.txt -> build/bdist.linux-x86_64/egg/EGG-INFO copying ReconSpider.egg-info/top_level.txt -> build/bdist.linux-x86_64/egg/EGG-INFO zip_safe flag not set; analyzing archive contents... creating 'dist/ReconSpider-1.0.7-py3.10.egg' and adding 'build/bdist.linux-x86_64/egg' to it removing 'build/bdist.linux-x86_64/egg' (and everything under it) Processing ReconSpider-1.0.7-py3.10.egg Removing /usr/local/lib/python3.10/site-packages/ReconSpider-1.0.7-py3.10.egg Copying ReconSpider-1.0.7-py3.10.egg to /usr/local/lib/python3.10/site-packages ReconSpider 1.0.7 is already the active version in easy-install.pth

    Installed /usr/local/lib/python3.10/site-packages/ReconSpider-1.0.7-py3.10.egg Processing dependencies for ReconSpider==1.0.7 Searching for tweepy Reading https://pypi.org/simple/tweepy/ Download error on https://pypi.org/simple/tweepy/: unknown url type: https -- Some packages may not be found! Couldn't find index page for 'tweepy' (maybe misspelled?) Scanning index of all packages (this may take a while) Reading https://pypi.org/simple/ Download error on https://pypi.org/simple/: unknown url type: https -- Some packages may not be found! No local packages or working download links found for tweepy error: Could not find suitable distribution for Requirement.parse('tweepy')

    opened by sebassaldiviap 1
  • installation

    installation

    Is your feature request related to a problem? Please describe. message when i run the script: Seems like you haven't installed Requirements or You are not using python3 version, Please install using: python3 setup.py install

    Describe the solution you'd like i have python3 installed

    Describe alternatives you've considered A clear and concise description of any alternative solutions or features you've considered.

    Additional context Add any other context or screenshots about the feature request here.

    opened by ladoual 3
Releases(1.0.7)
  • 1.0.7(Aug 19, 2021)

  • 1.0.6(Apr 9, 2020)

    New Features

    • Tool has module involved to scrape social media account details from Instagram, Facebook and Twitter
    • It can find details about Phone number
    • Email data Breach
    • Domain module has various scans for domain check for vulneribility and spider crawlers
    • Metadata Analyser
    • Reverse Image Search
    • IP Heatmap generator
    • Mac Address finder of manufacturer
    • IP2Proxy checks whether provided ip uses any kind of Proxy/VPN if any then check for DNSLeaks
    • Torrent Download History
    • Tool is currently available only in Command Line Interface (CLI)
    Source code(tar.gz)
    Source code(zip)
  • 1.0.5(Dec 28, 2018)

    • Added Censys plugin for Location Information Gathering
    • Added new Portscan option to discover hosts and services
    • Added Honeypot detection plugin
    • All new shortcuts for using ReconSpider options
    • New Error-free Setup.py (support all devices)
    • WHOIS results output Fixed
    • Added NSLookup for domain name mapping
    • No API required
    • Totally Re-designed
    • Support for Python 2 and 3
    • No more time taking registerations for API
    • No extra installer for Termux
    • New colored outputs (under testing)

    Note: Email option will be added in next update.

    Source code(tar.gz)
    Source code(zip)
  • 1.0.2(Dec 24, 2018)

    • Use Server IP Address to find Location, Organization, Internet Service Provider (ISP)
    • Gather Personal, Employment, Location, Social Accounts Information
    • Find Open ports in websites
    • Email Enumeration
    • WHOIS Report
    • Python 3.7 support
    • Mind Map (v1)
    • New API Input Generator
    • Shodan, Clearbit, FullContact API Support
    • Termux support for Android phones
    • Works on Linux, Windows, Android
    Source code(tar.gz)
    Source code(zip)
Owner
BhavKaran
CEH | PCEP | NSE | Cyber Security Researcher | Penetration Tester
BhavKaran
GitLab CE/EE Preauth RCE using ExifTool

CVE-2021-22205 GitLab CE/EE Preauth RCE using ExifTool This project is for learning only, if someone's rights have been violated, please contact me to

3ND 164 Dec 10, 2022
Brute-Force-Connected

Brute-Force-Connected Guess the password for Connected accounts the use : Create a new file and put usernames and passwords in it Example : joker:1234

4 Jun 05, 2022
DoSer.py - Simple DoSer in Python

DoSer.py - Simple DoSer in Python What is DoSer? DoSer is basically an HTTP Denial of Service attack that affects threaded servers. It works like this

1 Oct 12, 2021
Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any firewall exceptions or port forwarding rules

About: Arbitrium is a cross-platform is a remote access trojan (RAT), Fully UnDetectable (FUD), It allows you to control Android, Windows and Linux an

Ayoub 861 Feb 18, 2021
CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos

A denial of service (DoS) vulnerability (CVE-2021-36798) was found in Cobalt Strike. The vulnerability was fixed in the scope of the 4.4 release. More

104 Nov 09, 2022
A Superfast SMS & Call bomber for Linux And Termux !

A Superfast SMS & Call bomber for Linux And Termux !

Anubhav Kashyap 15 Feb 21, 2022
Kriecher is a simple Web Scanner which will run it's own checks for the OWASP

Kriecher is a simple Web Scanner which will run it's own checks for the OWASP top 10 https://owasp.org/www-project-top-ten/# as well as run a

1 Nov 12, 2021
Sonoff NSPanel protocol and hacking information. Tasmota Berry driver for NSPanel

NSPanel Hacking Sonoff NSPanel protocol and hacking information and Tasmota Berry driver. NSPanel protocol manual Tasmota driver nspanel.be Installati

blakadder 98 Dec 26, 2022
Bug Alert: a service for alerting security and IT professionals of high-impact and 0day vulnerabilities

Bug Alert Bug Alert is a service for alerting security and IT professionals of h

BugAlert.org 208 Dec 15, 2022
Dapunta Multi Brute Force Facebook - Crack Facebook With Login - Free

✭ DMBF CRACK Dibuat Dengan ❤️ Oleh Dapunta Author: - Dapunta Khurayra X ⇨ Fitur Login [✯] Login Token ⇨ Fitur Crack [✯] Crack Dari Teman, Public,

Dapunta ID 10 Oct 19, 2022
Rapidly enumerate subdomains and domains using rapiddns.io.

Description Simple python module (unofficial) allowing you to access data from rapiddns.io. You can also use it as a module. As mentioned on the rapid

27 Dec 31, 2022
Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA

nds2elf Requirements nds2elf.py uses LIEF and template.elf to form a new binary. LIEF is available via pip: pip3 install lief Usage DSi and DSi-enhan

Max Thomas 17 Aug 14, 2022
Mass scan for .git repository and .env file exposure

Mass .Git repository and .Env file Scan by Scarmandef Scanner to find .env file and .git repository exposure on multiple hosts Because of the response

8 Jun 23, 2022
log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc

说明 about author: 我超怕的 blog: https://www.cnblogs.com/iAmSoScArEd/ github: https://github.com/iAmSOScArEd/ date: 2021-12-20 log4j2 dos exploit log4j2 do

3 Aug 13, 2022
VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read

vcenter_fileread_exploit VMware vCenter earlier v(7.0.2.00100) unauthorized arbitrary file read Usage python3 vCenter_fileread.py http(s)://ip Referen

Ashish Kunwar 4 Sep 23, 2022
Cisco RV110w UPnP stack overflow

Cisco RV110W UPnP 0day 分析 前言 最近UPnP比较火,恰好手里有一台Cisco RV110W,在2021年8月份思科官方公布了一个Cisco RV系列关于UPnP的0day,但是具体的细节并没有公布出来。于是想要用手中的设备调试挖掘一下这个漏洞,漏洞的公告可以在官网看到。 准

badmonkey 25 Nov 09, 2022
A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regarding a specific target.

A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the given words, creating a unique and ideal wordlist to use regardin

Cycurity 39 Dec 10, 2022
This program is a WiFi cracker, you can test many passwords for a desired wifi to find the wifi password!

WiFi_Cracker About the Program: This program is a WiFi cracker! Just run code and select a desired wifi to start cracking 💣 Note: you can use this pa

Sina.f 13 Dec 08, 2022
Buffer Overflow para SLmail5.5 32 bits

SLmail5.5-Exploit-BoF Buffer Overflow para SLmail5.5 32 bits con un par de utilidades para que puedas hacer el tuyo REQUISITOS PARA QUE FUNCIONE: Desa

Luis Javier 15 Jul 30, 2022
Credit Card And SK Checker Written In Python

💳 Credit Card Checker (CC Checker) & Mass SK Checker & Generator 💳

Rimuru Tempest 53 Dec 31, 2022