> cat /dev/github | grep security-tools

Osint

Above

2026-03-30 Python ★ 848

AI Summary: Above is a network security sniffer designed for penetration testers and security engineers to identify vulnerabilities in network equipment through traffic analysis. It operates silently, leveraging the Scapy library, and supports the detection of up to 28 protocols, including ARP, EAPOL, and various SCADA protocols. Users can operate it in ‘hot’ mode for real-time sniffing or ‘cold’ mode for analyzing pre-captured traffic dumps, with features like passive ARP detection and VLAN segment search.

aleph

2026-03-30 JavaScript ★ 2337

AI Summary: Aleph is an open-source tool designed for indexing and searching large volumes of documents and structured data, primarily aimed at facilitating investigative reporting. Its notable features include the ability to cross-reference entities against various watchlists, enhancing the efficiency of data analysis for reporters and organizations engaged in investigative work. As of December 2025, the project is transitioning to a new platform, Aleph Pro, while transitioning support for the current version will continue until that date.

Android-Security-Exploits-YouTube-Curriculum

2026-03-30 ★ 714

AI Summary: The Android Security & Reverse Engineering YouTube Curriculum is a comprehensive educational resource focused on various aspects of Android security, including exploits, reverse engineering, and vulnerabilities in mobile applications. It features a curated collection of talks and demonstrations from prominent security conferences, addressing topics like heap exploitation, mobile permissions, and countermeasures against mobile threats. Notably, it educates on advanced concepts such as Bluetooth security, malware analysis, and attack vectors affecting the Android ecosystem, making it essential for cybersecurity practitioners and researchers.

Anthropic-Cybersecurity-Skills

2026-03-30 Python ★ 3846

AI Summary: Anthropic Cybersecurity Skills is an extensive open-source repository that provides AI agents access to 753 structured cybersecurity skills across 26 domains, offering capabilities such as memory forensics and Kubernetes RBAC auditing. The skills adhere to the agentskills.io standard, featuring a YAML structure for quick discovery and are fully mapped to MITRE ATT&CK and aligned with NIST CSF 2.0, enabling AI agents to perform advanced security tasks with enhanced contextual knowledge. This tool simplifies installation and empowers various platforms like Claude Code and GitHub Copilot to integrate these capabilities efficiently.

Argus

2026-03-30 Python ★ 3383

AI Summary: Argus is a Python-based toolkit designed for information gathering and reconnaissance, enabling security analysts to assess networks, web applications, and security environments effectively. It integrates a user-friendly interface with numerous reliable modules, facilitating the efficient execution of reconnaissance tasks. Notably, it offers various installation options including direct execution, pip installation, and Docker support, ensuring ease of use across different environments.


README

Argus

A Python-based toolkit for Information Gathering & Reconnaissance

asn

2026-03-30 Shell ★ 1853

AI Summary: The ASN Lookup Tool and Traceroute Server is a command line utility designed for network analysis, facilitating OSINT investigations through various capabilities including ASN lookup, RPKI validity checks, and geolocation of IP addresses. Key features include JSON output for API integration, support for querying multiple simultaneous targets, and integration with Shodan for reconnaissance without direct interaction with the target systems. This tool is particularly useful in incident response scenarios, providing comprehensive network data insights while maintaining stealth.

asnmap

2026-03-30 Go ★ 1026

AI Summary: asnmap is a Go CLI and library designed for quickly mapping organizational network ranges by leveraging Autonomous System Number (ASN) information. Its primary use case is for cybersecurity analysts to perform lookups for CIDR ranges based on various inputs such as ASN, organization name, domain, or IP addresses, with flexibility in output formats including JSON, CSV, and plain text. Notable features include support for multiple input types, integration with a Project Discovery Cloud Platform API for enhanced data retrieval, and the ability to operate with standard input/output.

AttackSurfaceMapper

2026-03-30 Python ★ 1402

AI Summary: AttackSurfaceMapper is a reconnaissance tool designed to enhance the attack surface mapping of specified domains, subdomains, and IP addresses through a combination of open-source intelligence and active techniques. It automates the discovery of additional targets using methods such as bruteforcing, passive lookups, and network scanning, while also conducting passive reconnaissance activities like website screenshot capture, visual mapping, and credential checking against public breach databases. Notable features include customizable output formats, optional API integrations for enhanced data collection, and various reconnaissance modes including a stealthy passive option.

Awesome-Blackhat-Tools

2026-03-30 ★ 785

AI Summary: Awesome Black Hat Tools is a curated repository of cybersecurity tools showcased at Black Hat events globally, serving as a practical reference for professionals in offensive, defensive, and research-driven cybersecurity. The tools are systematically organized by event location, year, and category, including Red Teaming, OSINT, and more, ensuring easy accessibility for users seeking field-tested solutions. This repository encourages community contributions to continually enhance the collection, making it a dynamic resource for current cybersecurity methodologies.

awesome-censys-queries

2026-03-30 Python ★ 1212

AI Summary: Awesome Censys Queries is a curated collection of unique and diverse queries intended for use with the Censys search engine, facilitating the exploration of various network services and devices. Its primary use case is to aid security researchers and network administrators in identifying and analyzing infrastructure, particularly in areas like industrial control systems, IoT devices, and database services. Notable features include organized categories for easy navigation, direct links to search results, and contributions from the community for expanding query resources.

awesome-hacker-search-engines

2026-03-30 Shell ★ 10379

AI Summary: Awesome Hacker Search Engines is a curated repository of search engines specifically designed for penetration testing, vulnerability assessments, and red/blue team operations. It categorizes various resources including general search engines, servers, vulnerabilities, exploits, and more, providing tools for effective reconnaissance and threat intelligence gathering. Notable features include links to specialized engines like Shodan and the NIST NVD, enabling streamlined access to critical information for security professionals.


README

Awesome Hacker Search Engines

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

awesome-malware-analysis

2026-03-30 ★ 13559

AI Summary: The Awesome Malware Analysis repository provides a comprehensive curated list of malware analysis tools and resources, aimed at enhancing research and understanding of malware threats. Notable features include sections on various categories such as malware collections, open-source threat intelligence, detection and classification methodologies, and online scanners, facilitating a structured approach for analysts. This resource serves as a valuable reference for cybersecurity professionals seeking effective tools for malware research and investigation.

awesome-oneliner-bugbounty

2026-03-30 ★ 3087

AI Summary: The “Awesome One-liner Bug Bounty” repository compiles a collection of efficient one-liner scripts specifically designed for bug bounty hunting, enabling users to identify vulnerabilities in web applications quickly. Notable features include commands for detecting Local File Inclusion, Open Redirects, Cross-Site Scripting, and various CVEs, all leveraging concise syntax to streamline reconnaissance and exploitation tasks. The repository encourages community contributions, fostering a collaborative environment for continuous improvement and sharing of bug bounty strategies.

awesome-osint

2026-03-30 ★ 25532

AI Summary: Awesome OSINT is a curated repository of open-source intelligence tools and resources designed for individuals involved in Cyber Threat Intelligence (CTI) and threat hunting. The repository offers a comprehensive list of utilities across various categories, including search engines, social media tools, and data analysis resources, catering to users from beginner to advanced levels. Notable features include specialized searches for academic resources, geospatial mapping, threat actor insights, and dark web exploration, enabling proactive intelligence gathering from publicly available sources.

Awesome-OSINT-For-Everything

2026-03-30 Shell ★ 2287

AI Summary: Awesome OSINT For Everything is a comprehensive repository of OSINT tools and websites aimed at penetration testing, red teaming, information gathering, and bug bounty initiatives. It organizes a wide array of resources categorized by specific use cases such as recon, threat intelligence, social media analysis, and more, making it a valuable tool for cybersecurity professionals seeking to enhance their investigative capabilities. Notable features include a detailed index of tools across various domains, including geo-location, cryptocurrency, and privacy/security resources, providing users with extensive options for OSINT-related tasks.

Awesome-Redteam

2026-03-30 Python ★ 4102

AI Summary: Awesome-Redteam is a comprehensive knowledge base designed for red teaming and offensive security research, providing users with a curated collection of tools, scripts, and tips. It features organized sections covering various aspects such as cybersecurity cheat sheets, cryptographic methods, cyberspace search tools, and open-source intelligence resources, all intended for educational purposes. The repository emphasizes legal usage and warns against employing its content for unauthorized activities.


README

Awesome-Redteam

stars forks last-commit

❗【免责声明】本项目所涉及的技术、思路和工具仅供学习,任何人不得将其用于非法用途和盈利,不得将其用于非授权渗透测试,否则后果自行承担,与本项目无关。 使用本项目前请先阅读 法律法规

awesome-social-engineering

2026-03-30 ★ 3914

AI Summary: The Awesome Social Engineering repository offers a curated collection of resources and tools specifically designed for cybersecurity professionals, penetration testers, and educational purposes within controlled environments. It features a diverse range of materials, including online courses, literature on psychology relevant to social engineering, and tools for practical application, making it a comprehensive guide for those interested in the field. Notably, it emphasizes ethical use and provides an engaging platform for learning and skill enhancement in social engineering techniques.

Awesome-Telegram-OSINT

2026-03-30 ★ 2628

AI Summary: Awesome-Telegram-OSINT is a comprehensive repository designed for Open Source Intelligence (OSINT) related to Telegram. Its primary use case is to facilitate the search and discovery of Telegram channels, groups, and tools through a curated list of search engines and directories. Notable features include a wide array of resources for searching Telegram content, including specialized databases, search engines, and community-driven catalogs, making it a valuable tool for researchers and analysts in the OSINT community.

awesome-termux-hacking

2026-03-30 ★ 4458

AI Summary: The “awesome-termux-hacking” repository aggregates a collection of tools designed for penetration testing and security assessments on Android devices using the Termux environment. Key tools include ANDRAX, a robust penetration testing platform that functions natively on Android, and ReconCobra, an automated pentest framework for information gathering. This repository enhances the capabilities of ethical hacking on mobile platforms by offering various utilities for tasks such as subdomain enumeration, exploit searching, and proxy management.

bbot

2026-03-30 Python ★ 9547

AI Summary: BBOT is a versatile reconnaissance tool designed primarily for automating tasks related to bug bounties and attack surface management (ASM). Notable features include comprehensive subdomain enumeration, web crawling to extract sensitive information, and an efficient integration of multiple APIs to enhance data gathering effectiveness. The tool also boasts a real-time visualization capability, allowing users to intuitively analyze results.


README

bbot_banner

Python Version License DEF CON Recon Village 2024 PyPi Downloads Ruff Tests Codecov Discord

BEE·bot is a multipurpose scanner inspired by Spiderfoot, built to automate your Recon, Bug Bounties, and ASM!

https://github.com/blacklanternsecurity/bbot/assets/20261699/e539e89b-92ea-46fa-b893-9cde94eebf81

bincat

2026-03-30 OCaml ★ 1854

AI Summary: BinCAT is a static binary code analysis toolkit designed to assist reverse engineers using IDA and Python automation. Its primary use cases include value and taint analysis, type reconstruction, and detection of memory management issues like use-after-free and double-free errors. Notable features include support for multiple CPU architectures, integration with IDA version 7.4 or later, and the ability to operate both locally and remotely via a web service.

blackbird

2026-03-30 Python ★ 5894

AI Summary: Blackbird is an OSINT tool designed for rapid username and email searches across over 600 platforms, integrating AI-powered profiling for enhanced data analysis. Notable features include community-driven accuracy, smart filters, automated analysis, and the ability to export results as PDF or CSV files. It leverages tools like WhatsMyName to provide low false positive rates while ensuring user privacy during its operations.


README

Blackbird

Blackbird is a powerful OSINT tool that combines fast username and email searches across more than 600 platforms with free AI-powered profiling. By leveraging community-driven projects like WhatsMyName, it ensures low false positive rates and high-quality results. Features include smart filters, polished PDF/CSV exports, and fully automated analysis — all from a single CLI.

BlackWidow

2026-03-30 Python ★ 1785

AI Summary: BlackWidow is a Python-based web application spider designed for gathering critical information from target websites, including subdomains, URLs, dynamic parameters, email addresses, and phone numbers. It features an integrated fuzzer, Inject-X, which scans dynamic URLs for common OWASP vulnerabilities, and automatically saves collected data into organized text files. Notable functionalities include deep crawling with customizable levels, verbose logging, and support for fuzzing unique parameters for enhanced security testing.

bluing

2026-03-30 Python ★ 993

AI Summary: Bluing is a specialized intelligence gathering tool designed to exploit vulnerabilities in Bluetooth protocols, facilitating various hacking techniques on Bluetooth devices. It provides essential features such as device address cleaning, hardware compatibility checks, and command options for managing Bluetooth connections, including Basic Rate and Low Energy systems. The tool is primarily intended for use on Linux operating systems, leveraging dependencies like BlueZ and requires Python 3.10 for installation.

Bug_Bounty_writeups

2026-03-30 Python ★ 855

AI Summary: The Bug Bounty Writeups repository serves as a comprehensive collection of write-ups documenting various types of security vulnerabilities encountered during bug bounty hunts, such as XSS, CSRF, and SQL injection. Its primary use case is to provide guidance and examples for ethical hackers and security researchers looking to enhance their skills and avoid common pitfalls in vulnerability disclosure. Notable features include a structured organization of write-ups by vulnerability type and the use of Bash for automation in certain contexts.

buster

2026-03-30 Python ★ 1290

AI Summary: Buster is a comprehensive Open Source Intelligence (OSINT) tool designed for email reconnaissance, capable of gathering social account links, breaches, and associated domains for a given email address. Notable features include the ability to generate potential emails and usernames, verify existing emails, and query various online sources and databases for comprehensive results. The tool is particularly useful for security researchers and investigators needing to gather detailed information on individuals or validate email addresses.

C2-Tracker

2026-03-30 Python ★ 762

AI Summary: C2 Tracker is a community-driven IOC feed that aggregates IP addresses related to known malware, botnets, and command-and-control (C2) infrastructures by leveraging searches from platforms like Shodan. Its primary use case is to facilitate threat intelligence by providing a regularly updated feed that can be ingested by various SIEM and EDR systems, enhancing detection and investigation capabilities. Notable features include version-controlled historical data, weekly updates, and compatibility with tools like OpenCTI and FortinetSIEM for streamlined integration and alerting.

cai

2026-03-30 Python ★ 7659

AI Summary: Cybersecurity AI (CAI) is a robust framework designed for enhancing cybersecurity measures by leveraging artificial intelligence. Its primary use case involves threat detection and incident response, making it suitable for both community and professional environments. Notable features include multi-platform support, advanced token management in the Professional Edition, and real-time performance benchmarks that are accessible for evaluation.


README

Cybersecurity AI (CAI)

aliasrobotics%2Fcai | Trendshift European Open Source - Most Starred Top 3 European Open Source - Most Forked Top 3

censys-subdomain-finder

2026-03-30 Python ★ 837

AI Summary: The Censys Subdomain Finder is a command-line tool designed to enumerate subdomains associated with a specified domain using Certificate Transparency logs from Censys. It retrieves subdomains that have ever been issued an SSL certificate by a public Certificate Authority, offering features such as output to a text file and support for API authentication. Notably, users must set up an account with Censys to access the API, as free accounts will face limitations beginning in late 2024.

cheatsheets

2026-03-30 ★ 735

AI Summary: The Cyber Detective Cheatsheets repository provides a comprehensive collection of cheat sheets focused on various aspects of Open Source Intelligence (OSINT) gathering techniques. Notable features include easily accessible text versions of cheat sheets on topics such as username, email, and reverse image OSINT, as well as guides for information gathering from companies and geolocation data. This tool serves as a practical resource for security professionals and investigators looking to streamline their OSINT processes.

Ciphey

2026-03-30 Python ★ 21284

AI Summary: Ciphey is a fully automated tool designed for decryption, decoding, and cracking of encoded data, leveraging natural language processing and artificial intelligence techniques. Its primary use case is to assist cybersecurity professionals and enthusiasts in deciphering encrypted messages and files without requiring prior knowledge of the encryption methods used. Notable features include support for various installation methods (Python, Docker, MacPorts, Homebrew) and a user-friendly interface that simplifies the decryption process.

ClatScope

2026-03-30 Python ★ 1429

AI Summary: ClatScope is an advanced OSINT tool designed for comprehensive online reconnaissance, catering to investigators and cybersecurity professionals. It consolidates data from multiple APIs to deliver insights on IP addresses, domains, emails, and personal data, while offering features such as username verification across numerous platforms, phone number validation, and email security checks. ClatScope Mini provides a simplified version for quick operations without API configuration, making it accessible for immediate use.

claude-bug-bounty

2026-03-30 Python ★ 1282

AI Summary: Claude Bug Bounty is an AI-powered agent harness tailored for professional bug bounty hunting, enabling users to streamline their testing processes. It intelligently orchestrates over 25 tools, remembers past findings across targets, validates vulnerabilities to reduce false positives, and generates ready-to-submit reports in under a minute. Notable features include Burp MCP integration for live traffic monitoring and an autonomous hunting mode that simplifies the testing workflow.


README

v3.0.0

Claude Bug Bounty

The AI-Powered Agent Harness for Professional Bug Bounty Hunting

Your AI copilot that sees live traffic, remembers past hunts, and hunts autonomously.

cloud_enum

2026-03-30 Python ★ 2048

AI Summary: cloud_enum is a multi-cloud OSINT tool designed for the enumeration of public resources across AWS, Azure, and Google Cloud Platform. Its notable features include the ability to identify open and protected cloud resources, such as S3 buckets, Azure storage accounts, and Firebase databases, utilizing customizable keyword inputs for comprehensive scanning. Although currently less maintained, the tool is positioned for migration to the Nuclei framework for improved functionality and community contributions.

CloudFail

2026-03-30 Python ★ 2532

AI Summary: CloudFail is a reconnaissance tool designed to uncover the origin server of targets protected by Cloudflare by utilizing three distinct attack phases: misconfigured DNS scans, querying the Crimeflare database, and brute-forcing over 2500 subdomains. The tool operates through Tor to maintain anonymity while performing these scans, making it particularly useful for security researchers conducting penetration tests or academic inquiries. Key features include seamless integration with Tor for privacy, a focus on potential DNS misconfigurations, and an easy-to-use scanning interface.

CrossLinked

2026-03-30 Python ★ 1488

AI Summary: CrossLinked is a LinkedIn enumeration tool that leverages search engine scraping to extract valid employee names from targeted organizations, enabling enumeration without the need for API keys or direct LinkedIn access. It supports customizable naming conventions for output formatting and offers features like proxy rotation and the ability to parse data into both text and CSV files. This tool is particularly useful for security researchers and penetration testers looking to gather information about potential targets.

Crucix

2026-03-30 JavaScript ★ 7470

AI Summary: Crucix is an open-source intelligence tool that aggregates real-time data from 27 diverse sources—including satellite fire detection, flight tracking, and economic indicators—into a single, self-hosted dashboard updated every 15 minutes. Its primary use case is to provide researchers, journalists, and analysts with accessible, cross-correlated insights without relying on cloud services or subscriptions. Notable features include integration with LLMs for two-way interaction, customizable alerts via Telegram and Discord, and a user-friendly interface that simplifies monitoring complex global events.

ctf-skills

2026-03-30 Python ★ 837

AI Summary: The ctf-skills repository provides an extensive collection of agent skills designed to facilitate the solving of Capture The Flag (CTF) challenges across various domains, including web exploitation, binary pwn, reverse engineering, and more. Notable features include support for multiple installation methods, a comprehensive tool installer script, and detailed skill documentation for on-demand use, allowing users to efficiently integrate the necessary tools as challenges arise. It is compatible with any tool adhering to the Agent Skills specification, enhancing its versatility in competitive cybersecurity contexts.

CTFCrackTools

2026-03-30 Rust ★ 2093

AI Summary: CTFCrackTools X is a next-generation, node-based toolkit designed for CTF (Capture The Flag) competitions, offering an extensive set of over 43 built-in algorithms for encoding, cryptography, and hashing. Key features include a visual workflow that allows users to construct custom encoding and decoding processes intuitively, and native support across Windows, macOS, and Linux platforms without the need for additional runtime installations. The tool emphasizes performance and extensibility, streamlining the process of handling various CTF challenges.

DataSurgeon

2026-03-30 Rust ★ 884

AI Summary: DataSurgeon is a comprehensive tool for extracting sensitive information pertinent to incident response, DLP, penetration testing, and CTF challenges. It supports extraction of a wide range of data types—including emails, credit cards, URLs, and various hashes—across multiple operating systems, and features a plugin management system that allows users to extend its functionality. Notable features include recursive file analysis, CSV output capabilities, and multi-platform support enabling usage on Windows, Linux, and macOS.

DedSec

2026-03-30 Python ★ 930

AI Summary: The DedSec Project is an educational toolkit designed for Android using Termux, integrating various scripts, utilities, and local web interfaces to facilitate learning about cybersecurity tools and workflows. It aims to enhance users’ understanding of defensive awareness through practical exercises and organized scripts, while supporting both English and Greek interfaces. Notable features include a comprehensive installation guide, diverse categories of tools, and a focus on educational usage, including personal information capture and simulated environments.

destroylist

2026-03-30 HTML ★ 910

AI Summary: Destroylist is a comprehensive phishing and scam domain blacklist that provides real-time threat intelligence to protect users globally. This tool maintains an extensive database of over 100,000 phishing domains and features active statistics on domain additions and removals, ensuring up-to-date protection against online threats. The repository supports community contributions, fostering collaborative efforts in enhancing online security.


README

Performing Arts Destroylist: Phishing & Scam Domain Blacklist

Destroyolist Illustration

DetectDee

2026-03-30 Go ★ 1711

AI Summary: DetectDee is a reconnaissance tool designed to track down social media accounts using identifiers such as usernames, emails, and phone numbers across various social networks. Notable features include precise control over request handling to evade web application firewalls, support for multiple input types for user detection, and the option for integration with ChatGPT for enhanced result tagging. Its extensibility and ease of use make it suitable for cybersecurity practitioners in their investigations.

Digital-Forensics-Guide

2026-03-30 Python ★ 2485

AI Summary: The Digital Forensics Guide serves as a comprehensive resource for those engaged in digital forensics, providing a compilation of applications, libraries, and tools essential for effectively conducting forensic investigations. The guide includes sections on various forensic fields such as computer, mobile, and network forensics, along with curated lists of tutorials, certifications, and frameworks to enhance practitioners’ skills and knowledge. Notable features include playbooks for practical application and a structured format for easy navigation through key topics.

discover

2026-03-30 Shell ★ 3834

AI Summary: Discover is a customizable suite of bash scripts designed to automate various tasks in penetration testing, including recon, scanning, enumeration, and malicious payload creation with Metasploit, ideal for use on Kali Linux or Ubuntu systems. Notable features include multiple reconnaissance options for domains and persons, automated scanning tools that utilize Nmap and other utilities, and web application testing facilities incorporating tools like Nikto and SSL analysers. The tool simplifies complex penetration testing workflows through an organized menu structure, enabling swift task execution.

dnsgen

2026-03-30 Python ★ 1055

AI Summary: DNSGen 2.0 is an advanced DNS name permutation engine tailored for security researchers and penetration testers, facilitating subdomain discovery and security assessments through the generation of intelligent domain name variations. Notable features include a smart domain name permutation engine, support for custom wordlists, multiple sophisticated permutation techniques such as word affixing and cloud-specific patterns, and integration capabilities with tools like MassDNS for efficient domain resolution.


README

DNSGen 2.0 - Advanced DNS Name Permutation Engine 🚀

License: MIT Python 3.9+ Code style: black

dnstwist

2026-03-30 Python ★ 5638

AI Summary: dnstwist is a DNS-centric tool designed for domain name permutation and reconnaissance, allowing security researchers to discover potential phishing domains and domain variations. Its primary use case is to enhance domain security assessments by identifying lookalike domains and subdomain enumeration. Notable features include support for various DNS record lookups, historical data integration, and API access for automation.


README

docs/README.md

domain-digger

2026-03-30 TypeScript ★ 1037

AI Summary: Domain Digger is a comprehensive domain analysis toolkit designed to provide detailed insights into domain information through a user-friendly interface. Its primary use case includes performing DNS lookups, WHOIS inquiries, and IP geolocation, while notable features include intelligent search suggestions, a visual DNS map, and support for multiple DNS resolvers, enhancing both the depth and efficiency of domain investigations.


README

Do you enjoy using Domain Digger? Leave a star! 🌟

Dorks-collections-list

2026-03-30 ★ 2562

AI Summary: Dorks-collections list is a comprehensive repository that aggregates various search engine dorks tailored for cybersecurity professionals, penetration testers, and researchers. It features organized links to dork lists across multiple platforms such as Google, Shodan, and GitHub, facilitating targeted searches for sensitive data and vulnerabilities. Notable features include specific sections for different types of dorks, including those for detecting sensitive files, SQL injection vulnerabilities, and administrative panels, alongside automation tools and browser extensions for streamlined usage.

EmailAll

2026-03-30 Python ★ 738

AI Summary: EmailAll is a powerful email collection tool designed to aggregate email addresses from various online sources, including search engines and datasets. Its primary use case is to support cybersecurity professionals in gathering emails for domain reconnaissance, and it features integration with multiple API services for data retrieval along with modular results storage in JSON format. The tool allows easy configuration for proxies and APIs, enhancing its flexibility for various deployment environments.

emploleaks

2026-03-30 Python ★ 771

AI Summary: EmploLeaks is an Open Source Intelligence (OSINT) tool that facilitates the gathering of employee information from companies, primarily utilizing LinkedIn to extract employee lists and personal email addresses. Notable features include the ability to search a custom COMB database for leaked passwords using the retrieved emails, and an extension for identifying personal code repositories on GitLab. The tool requires Python for installation and offers a user-friendly command-line interface for executing its functionalities.

fav-up

2026-03-30 Python ★ 1193

AI Summary: Fav-up is a tool that leverages favicon icons to identify real IP addresses using the Shodan API. It supports multiple lookup methods, including local files, URLs, and domain searches, and can output results in CSV or JSON formats. Key features include customizable API key input options, support for batch processing via input lists, and the ability to retrieve detailed information such as favicon hashes and associated masked IPs.

FavFreak

2026-03-30 Python ★ 1268

AI Summary: FavFreak is a reconnaissance tool that streamlines the process of gathering information using favicon hashes from a list of URLs. It fetches the favicon.ico for each URL, computes its hash, and matches it against a predefined fingerprint dictionary to identify known services. Key features include sorting results by favicon hashes and generating Shodan dorks, making it a valuable asset for bug bounty hunters and OSINT investigations.


README

FavFreak - Weaponizing favicon.ico for BugBounties , OSINT and what not

FacFreak

FBI-tools

2026-03-30 ★ 2443

AI Summary: FBI-tools is a comprehensive Open Source Intelligence (OSINT) toolkit featuring a variety of tools for analysts to gather and analyze data from multiple online sources. Its notable features include domain squatting detection with SquatSquasher, web reconnaissance capabilities with reNgine, and efficient user account searches across platforms using UsernameSearchOSINT. Additionally, the collection encompasses specialized tools for investigating social media, phone numbers, and dark web intelligence, streamlining the OSINT process.

FinalRecon

2026-03-30 Python ★ 2681

AI Summary: FinalRecon is an automated web reconnaissance tool designed to efficiently gather comprehensive information about a target in a short time, maintaining high accuracy without the overhead of multiple dependencies. Notable features include detailed data collection on headers, WHOIS, SSL certificate information, DNS enumeration, subdomain and directory enumeration, web crawling, and a port scanning functionality, all in one compact solution. This tool is especially useful for OSINT practitioners seeking quick and reliable data during the reconnaissance phase of security assessments.

Findomain

2026-03-30 Rust ★ 3711

AI Summary: Findomain is a comprehensive domain recognition tool designed for efficient subdomain enumeration and monitoring. It utilizes Certificate Transparency Logs and various APIs to discover subdomains without brute-force methods, supports multi-threading for quick searches, and offers integration with notification services such as Discord and Slack. Notable features include DNS over TLS support, parallel resolution capabilities, and extensive configuration options across multiple formats.


README

Follow on Twitter Follow on Twitter

Travis CI Status Appveyor CI Status Build status

flowsint

2026-03-30 TypeScript ★ 2800

AI Summary: Flowsint is an open-source OSINT graph exploration tool designed to facilitate ethical investigations by visualizing relationships between entities in a graph format. Its primary use case is in reconnaissance tasks, providing a suite of automated enrichers for domains, IPs, social media, organizations, and more, thus allowing users to gather comprehensive intelligence efficiently while ensuring data privacy by storing everything locally. Notable features include advanced enrichers for domain and IP investigations, as well as integrations for broader workflow connectivity.

fsociety

2026-03-30 Python ★ 1705

AI Summary: fsociety is a modular penetration testing framework designed to assist cybersecurity professionals in conducting security assessments. Notable features include a command-line interface with options for retrieving information and suggesting tools, as well as support for installation via pip and Docker. The framework’s modular approach allows users to integrate various tools for comprehensive security testing.


README

fsociety-team/fsociety

fsociety

PyPI Python Version PyPI - Downloads Docker Image Size (tag) PRs Welcome Open in Visual Studio Code Twitter Follow

Garud

2026-03-30 Shell ★ 804

AI Summary: Garud is an automation tool designed for reconnaissance, specifically targeting sub-domain enumeration and vulnerability scanning for injection points such as XSS, SSRF, and SSTI. It integrates multiple popular bug bounty tools, including Assetfinder, Subfinder, and Nuclei, to streamline the scanning process, outputting results systematically while notifying the user upon completion. Notable features include the ability to filter and identify low-hanging vulnerabilities, along with systematic data collection and reporting functionalities.

gasmask

2026-03-30 Python ★ 1395

AI Summary: GasMasK is an all-in-one open-source information gathering tool designed for Open Source Intelligence (OSINT) tasks. It facilitates data collection across various platforms such as Google, Shodan, and social media, allowing users to search for domains and extract relevant information through an extensive set of features, including customizable output formats and API integrations for enhanced functionality. The tool is built in Python and supports numerous search methods, making it a versatile choice for cybersecurity professionals conducting reconnaissance.

GeoIntel

2026-03-30 HTML ★ 1015

AI Summary: GeoIntel is a Python tool leveraging Google’s Gemini API for AI-powered geolocation analysis of images, allowing users to identify the likely location where photos were taken. It features both a command-line interface and an interactive web interface with drag-and-drop functionality, real-time analysis, and support for additional context and location guesses. Notable capabilities include generating Google Maps links, providing confidence levels for predictions, and exporting results in JSON format.

geowifi

2026-03-30 Python ★ 1217

AI Summary: geowifi is a tool designed for querying WiFi geolocation data based on the BSSID or SSID from various public databases. Its primary use case is to facilitate the retrieval of network location information, providing output in either map or JSON format. Notable features include support for multiple APIs like Wigle, Google Geolocation, and Combain, enabling users to easily configure and access comprehensive WiFi data.


README

📡💘🌎 | geowifi

Search WiFi geolocation data by BSSID and SSID on different public databases.

getJS

2026-03-30 Go ★ 860

AI Summary: getJS is a command-line tool and Go package designed for extracting JavaScript sources from URLs and HTTP responses, catering primarily to penetration testers, bug bounty hunters, and developers. Its notable features include customizable request options, support for input from files, and the ability to resolve relative URLs, enhancing the efficiency of JavaScript extraction processes.


README

JavaScript Extraction CLI & Package

This is a powerful tool for extracting JavaScript sources from URLs and web pages / HTTP responses. It offers a command-line interface (CLI) for straightforward URL processing and a package interface for custom integrations, making it ideal for pentesters, bug bounty hunters, and developers needing to extract JS sources efficiently.

GhostTrack

2026-03-30 Python ★ 8289

AI Summary: GhostTrack is an OSINT tool designed for tracking the location or mobile number of targets, facilitating information gathering through various tracking functionalities. Its notable features include IP tracking, phone number tracking, and username tracking across social media platforms, allowing users to collect comprehensive data on their targets. The tool is straightforward to install on Linux or Termux and is continuously updated, with the latest version being 2.2.


README

GhostTrack

Useful tool to track location or mobile number, so this tool can be called osint or also information gathering

GHunt

2026-03-30 Python ★ 18617

AI Summary: GHunt is an offensive Google framework focused on OSINT, enabling users to extract information using various modules related to Google services. Key features include a command-line interface, asynchronous processing, JSON export capabilities, and a browser extension for easier login. The tool is designed for security assessments, data gathering, and enhancing investigative workflows linked to Google accounts and assets.


README


🌐 GHunt Online version : https://osint.industries

🐍 Now Python 3.13 compatible !


Python minimum version

git-hound

2026-03-30 Go ★ 1408

AI Summary: GitHound is a secret detection tool designed to identify exposed API keys, secrets, and credentials across GitHub repositories using advanced pattern matching and commit-history analysis. Its notable features include global GitHub search capabilities, smart API key detection mechanisms, and the ability to visualize results in real-time through the GitHound Explore dashboard. This tool is particularly useful for security professionals in corporate environments and bug bounty hunters seeking to uncover sensitive information that may lead to vulnerabilities.

GitFive

2026-03-30 Python ★ 971

AI Summary: GitFive is an OSINT tool designed for investigating GitHub profiles, enabling users to track username histories, variations, and associated email addresses. Key features include the ability to discover GitHub accounts from lists of emails, analyze repositories, and generate possible email combinations, all while operating efficiently within GitHub’s API rate limits. The tool also supports features like SSH key dumping and JSON exports for ease of data handling.


README

GitGot

2026-03-30 Python ★ 1553

AI Summary: GitGot is a semi-automated tool designed for the quick identification of sensitive information and secrets stored in public GitHub repositories. It leverages user feedback to refine search results, allowing for the dynamic creation of blacklists based on filenames, repository names, or file content matches. Notable features include session persistence, the ability to query GitHub Gists or self-hosted instances, and support for advanced search syntax using the GitHub Search API.

gitGraber

2026-03-30 Python ★ 2252

AI Summary: gitGraber is a real-time monitoring tool designed to detect sensitive data leaks across GitHub for various online services, including AWS and Facebook. Its primary use case is to identify and notify users of potential API key exposures through Slack, Discord, or directly in the command line, while minimizing false positives with precise regex patterns. Notable features include configurable keyword searches, automated monitoring through cron jobs, and a dynamic wordlist that adapts to discovered filenames.

globalthreatmap

2026-03-30 TypeScript ★ 1413

AI Summary: The Global Threat & Event Intelligence Map is a real-time situational awareness platform designed for visualizing security events, geopolitical developments, and threat indicators on an interactive map. Key features include a customizable event mapping system, a filterable event feed, and detailed intelligence dossiers on various actors, along with visualization layers for military bases. This tool serves as an OSINT command center, aggregating and synthesizing global conflict data for enhanced situational analysis.

gogo

2026-03-30 Go ★ 2036

AI Summary: gogo is a versatile network scanning tool designed for both active and passive fingerprinting, featuring customizable port configurations and the extraction of key information such as titles and certificates through regex patterns. It supports the integration of Nuclei proof of concepts (POCs) and offers a heuristic scanning mode for improved performance with minimal resource usage, making it highly efficient for vulnerability detection. The tool is entirely written in Go, ensuring compatibility with minimal dependencies across various operating systems, including legacy versions like Windows 2003.

Goohak

2026-03-30 Shell ★ 740

AI Summary: GooHak is an automated tool designed for launching Google hacking queries against specified target domains to uncover vulnerabilities and facilitate enumeration. Its primary use case is to streamline the process of gathering information through tailored search queries, leveraging Google’s search capabilities. Notable features include straightforward command-line usage and dependencies tailored for Linux environments.


README

GooHak

ABOUT:

Automatically launch google hacking queries against a target domain to find vulnerabilities and enumerate a target.

gosearch

2026-03-30 Go ★ 3296

AI Summary: GoSearch is an OSINT tool designed to automate the process of searching for online profiles associated with specific usernames, utilizing concurrency for efficiency. It integrates searches across multiple extensive databases, including 900,000 leaked credentials from HudsonRock and over 18 billion from BreachDirectory, enhancing its capability to detect compromised accounts. Notable features include the ability to filter results for accuracy with the --no-false-positives flag and the option to crack found password hashes using Weakpass, significantly boosting the tool’s effectiveness in cybersecurity investigations.

h8mail

2026-03-30 Python ★ 4936

AI Summary: h8mail is an email open-source intelligence (OSINT) and breach hunting tool designed to search for emails across various breach and reconnaissance services, including local database breaches. It features advanced capabilities such as regex-based email pattern matching, support for multiprocessed local searches, and integration with premium APIs for enhanced data retrieval. Additionally, it allows bulk file processing and the output of results in CSV or JSON format, making it highly versatile for cybersecurity professionals.

hacking-resources

2026-03-30 ★ 2417

AI Summary: The Lifka/hacking-resources repository is a curated collection of hacking utilities and cheat sheets, aimed at assisting cybersecurity professionals and enthusiasts in their studies. It includes a variety of resources such as tools, OS distributions, tutorials, and specific cheat sheets for cloud, web, network, and system hacking. Notable features involve a comprehensive index and contributions from the community, facilitating an ongoing accumulation of valuable cybersecurity knowledge.


README

Hacking resources and cheat sheets

All Contributors

Hacking-Windows

2026-03-30 C ★ 1566

AI Summary: Hacking Windows is a comprehensive resource that provides insights into reverse engineering and hacking techniques specifically for Windows applications using Assembly language. It includes practical examples, tutorials, and chapters dedicated to debugging and analyzing various Windows API functions in both x86 and x64 architectures. Notable features include accessible self-study material, a free downloadable book, and hands-on exercises focused on real-world programming scenarios.


README

image

FREE Reverse Engineering Self-Study Course HERE


Hacking Windows

The book and code repo for the FREE Hacking Windows book by Kevin Thomas.

HackVault

2026-03-30 JavaScript ★ 2023

AI Summary: HackVault is a container repository designed for both defensive and offensive hacking tools. Its primary use case is to centralize and share various hacking utilities, which are intended to be continuously updated with new content over time. Notable features include a structured Wiki section for detailed information and ongoing additions to its arsenal of tools.


README

HackVault

This is a container repository for my defensive/offensive hacks. Go check the Wiki section for more information! Ideally, it’d be continually updated with new interesting stuff over time!

harpoon

2026-03-30 Python ★ 1272

AI Summary: Harpoon is a command-line interface (CLI) tool designed for open-source intelligence (OSINT) and threat intelligence gathering. Its primary use case involves extracting comprehensive data from multiple security-related APIs, such as those for IP addresses, ASN queries, and domain information, through a range of built-in plugins. Notable features include support for multiple data sources, configurable API keys, and the ability to update the tool seamlessly for ongoing intelligence needs.

hexstrike-ai

2026-03-30 Python ★ 7757

AI Summary: HexStrike AI is an advanced penetration testing platform that integrates over 150 security tools and more than 12 autonomous AI agents for automated cybersecurity assessment. Its primary use case focuses on cybersecurity automation, employing intelligent decision-making and vulnerability intelligence to optimize attack strategies and resource management. Notable features include real-time dashboards, progress visualization, and a multi-agent architecture that facilitates comprehensive penetration testing and threat analysis.


README

HexStrike AI Logo

HexStrike AI MCP Agents v6.0

AI-Powered MCP Cybersecurity Automation Platform

Python License Security MCP Version Tools Agents Stars

HostHunter

2026-03-30 Python ★ 1158

AI Summary: HostHunter is a Python-based tool designed for the discovery and extraction of hostnames linked to specified IPv4 or IPv6 addresses, utilizing OSINT and active reconnaissance methods. It generates comprehensive reports in various formats, including CSV and Nessus, and features capabilities like SSL certificate extraction, hostname validation, and the ability to capture screenshots of target applications. This tool is particularly beneficial for organizations aiming to assess their attack surface effectively.

I-See-You

2026-03-30 Shell ★ 1120

AI Summary: I-See-You is a Bash and JavaScript tool designed for identifying the precise geographical location of users during social engineering or phishing attempts by utilizing their location coordinates. The tool allows attackers to gather crucial reconnaissance data, facilitating targeted attacks, and functions without requiring any additional software for phishing operations. Users can easily execute the tool by running a script and can modify the appearance of the phishing page to enhance deception.

ignorant

2026-03-30 Python ★ 1610

AI Summary: Ignorant is a tool designed to check the presence of a phone number across various platforms, such as Snapchat and Instagram, without alerting the target. Its primary use case is to facilitate user verification linked to phone numbers for security assessments, while notable features include support for asynchronous operations, rate limiting detection, and integration with multiple modules for different websites.


README

Ignorant

👋 Hi there! For any professional inquiries or collaborations, please reach out to me at: megadose@protonmail.com

iKy

2026-03-30 Python ★ 942

AI Summary: iKy is a cybersecurity tool designed to collect and display information related to email addresses through an intuitive visual interface. It integrates multiple modules such as FullContact, LinkedIn, and HaveIBeenPwned, allowing users to gather diverse data points about email owners, enhancing the reconnaissance process in cybersecurity investigations. The tool leverages technologies like Flask for the interface, Redis for storage, and is deployable via Docker, ensuring robust performance and ease of use.

infoooze

2026-03-30 JavaScript ★ 993

AI Summary: Infoooze is an OSINT tool designed for efficient information gathering on targets such as websites, IP addresses, and usernames through a command-line interface. Notable features include various reconnaissance capabilities like subdomain scanning, Whois lookups, and automatic results saving to text files, facilitating streamlined data collection. Additionally, it supports multiple operating systems, including Linux, Windows, and Termux.


README


Logo

Infoooze

Report Bug · Request Feature

GitHub Repo stars npms.io (final) npm version
npm Libraries.io SourceRank

Table of Content

  1. About Infoooze
  2. Getting Started
  3. Usage
  4. Run in Gitpod
  5. Contributing
  6. License
  7. Contact

About Infoooze

Infoooze is a powerful and user-friendly OSINT (Open-Source Intelligence) tool that allows you to quickly and easily gather information about a specific target. With Infoooze, you can easily search for information about websites, IP addresses, usernames, and more, all from the convenience of a simple command-line interface.

instagram_monitor

2026-03-30 Python ★ 820

AI Summary: Instagram Monitor is a comprehensive OSINT tool designed for real-time tracking of Instagram activities, including post updates, follower changes, and profile modifications. Key features include interactive dashboards, anonymous media downloads, smart notifications via multiple channels, and enhanced privacy settings to simulate human behavior and avoid detection. This tool effectively provides insights into user engagement and media management, making it vital for social media analysts.


README

instagram_monitor

GitHub Release PyPI Version GitHub Stars Python Versions License Last Commit Maintenance

InstagramPrivSniffer

2026-03-30 Python ★ 724

AI Summary: InstagramPrivSniffer is a digital investigation tool designed for accessing and analyzing posts from private Instagram accounts that are made visible through collaborations with public accounts. Notable features include the ability to download and view media from these private accounts, serving primarily as an OSINT resource for cybersecurity professionals. The tool is intended strictly for educational and research purposes, and its use should be approached with legal considerations in mind.

instaloader

2026-03-30 Python ★ 12033

AI Summary: Instaloader is a command-line tool designed for downloading media from Instagram profiles, including photos, videos, stories, comments, and geotags. It supports both public and private profiles, offers features for handling profile name changes, and includes options for filtering and customizing download locations. Additionally, it allows users to efficiently update local copies of profiles and preserves session cookies for seamless access to private content.


README

.. image:: https://raw.githubusercontent.com/instaloader/instaloader/master/docs/logo_heading.png

.. badges-start

inventory

2026-03-30 Shell ★ 1528

AI Summary: Inventory is a tool designed for attack surface management of public bug bounty programs, aggregating DNS and web server data from over 800 organizations. Its primary use case is to assist bug bounty hunters in efficiently identifying and monitoring new assets while providing security teams with enhanced visibility into their assets. Notable features include automated data collection and transformation from multiple sources, duplicate program merging, and both passive and active enumeration workflows for comprehensive reconnaissance.

ipranges

2026-03-30 Shell ★ 1021

AI Summary: IPRanges is a tool that compiles and lists the IP address ranges for various cloud services and platforms, including Google, Amazon, Microsoft, and others. It provides separate text files for IPv4 and IPv6 addresses, categorized into unmerged and merged formats for efficiency. The dataset is updated daily and sourced from publicly available information, making it useful for network management and security configurations.


README

IPRanges

IP Ranges

List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), DigitalOcean, GitHub, Facebook (Meta), Twitter, Linode, Telegram, OpenAI (GPTBot), CloudFlare, Vultr, Apple (Private Relay) and ProtonVPN with daily updates.

ivre

2026-03-30 Python ★ 3989

AI Summary: IVRE (Instrument de veille sur les réseaux extérieurs) is a comprehensive network reconnaissance framework designed for both passive and active reconnaissance. It integrates multiple data sources and tools such as Zeek, Nmap, and Masscan, enabling users to gather extensive information about networks efficiently. Notable features include a web interface for data visualization, support for various database backends, and a modular architecture that allows for easy integration of additional tools.

karma_v2

2026-03-30 Shell ★ 957

AI Summary: Karma v2 is a passive open-source intelligence (OSINT) automated reconnaissance framework designed for information security researchers, penetration testers, and bug hunters to gather extensive details about target systems. It integrates with the Shodan Premium API to perform a variety of scans including SSL certificate verification, vulnerability detection, and asset discovery, and it features capabilities like fetching IP banners and interesting leaks across numerous protocols and services. The tool’s output can be displayed in the terminal and saved to files for further analysis.

leaky-paths

2026-03-30 ★ 1029

AI Summary: Leaky Paths is a curated repository of high-quality wordlists designed for web content discovery, targeting misconfigurations and sensitive API endpoints in major web frameworks and infrastructure projects. It serves as a rapid assessment tool for pentesters, security engineers, and bug bounty hunters, emphasizing modern tech stack paths that yield valuable insights while intentionally maintaining a concise list for optimal efficiency. Notable features include paths associated with known vulnerabilities and endpoints that typically expose sensitive data, facilitating quick identification of potential security issues.

Legendary_OSINT

2026-03-30 ★ 719

AI Summary: Legendary OSINT is a comprehensive curated repository of open-source intelligence (OSINT) tools and resources designed to aid users in various investigative scenarios. It encompasses a diverse range of categories, including social media searches, geospatial analysis, malware investigation, and dark web monitoring, facilitating enhanced data collection and analysis for cybersecurity professionals and researchers. Notable features include categorized documentation, contributions from multiple sources, and a focus on responsible usage of third-party tools.

linkedin2username

2026-03-30 Python ★ 1652

AI Summary: linkedin2username is an OSINT tool designed to generate potential username formats for employees of a specified company using LinkedIn’s web interface, requiring user authentication without an API key. Key features include customizable output formats for usernames, the ability to append domain names, and options for depth of search and filtering by keywords. The tool leverages web scraping techniques and is sensitive to LinkedIn’s rate limits, making it suitable for security research purposes.

linkook

2026-03-30 Python ★ 924

AI Summary: Linkook is an OSINT tool designed for discovering linked social media accounts and associated emails based on a single username across multiple platforms. Its notable features include the ability to check for email breaches using HudsonRock’s Cybercrime Intelligence Database, and exporting scan results in a Neo4j-compatible format for visual analysis. The tool supports various command-line options for summarizing output, detailed scans, and configuring data handling.


README

Linkook

English | 中文

maigret

2026-03-30 Python ★ 19304

AI Summary: Maigret is a user-centric OSINT tool designed to gather comprehensive profiles based on usernames by scanning over 3000 websites, including Tor and I2P networks. Key features include profile data extraction, recursive search capabilities, and automated handling of censorship and captcha challenges, all without requiring API keys. This tool serves as an effective resource for analysts in social media investigations and identity verification.


README

Maigret

PyPI version badge for Maigret PyPI download count for Maigret Minimum Python version required: 3.10+ License badge for Maigret View count for Maigret project

mailcat

2026-03-30 Python ★ 840

AI Summary: Mailcat is a tool designed to discover existing email addresses based on a user’s nickname, supporting over 170 domains across 37 email providers. It offers functionality through scripts that can be run via Tor or proxy to maintain anonymity, and it employs various methods such as SMTP and API for address retrieval. Notable features include extensive provider support and options for managing connection limits to enhance performance.


README

mailcat

malcom

2026-03-30 Python ★ 1166

AI Summary: Malcom is a malware communication analyzer that visualizes network traffic to identify interactions with known malware sources, thereby aiding in malware analysis and intelligence gathering. Its primary use case is to detect command and control servers, monitor peer-to-peer networks, and unravel DNS fast-flux infrastructures. Notable features include its ability to convert complex network traffic data into actionable intelligence and a user-friendly graphical interface for rapid analysis.


README

Malcom - Malware Communication Analyzer

Malcom is a tool designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources. This comes handy when analyzing how certain malware species try to communicate with the outside world.

Malware-Exhibit

2026-03-30 Assembly ★ 1155

AI Summary: Malware-Exhibit is a malware analysis tool designed for researchers and security professionals to dissect and analyze various malware samples. It supports multiple programming languages and platforms, allowing users to examine the behavior and characteristics of malware, providing insights for threat detection and mitigation. Notable features include a comprehensive user interface and the ability to integrate additional analysis tools and scripts.


README

Licence

⚠️⚠️ Malware-Exhibit ⚠️⚠️

CC++GoJavaJavaScriptPerlRubyPHP PowerShellPythonR.NetShell ScriptTypeScriptRustFirefoxEdgeFirebasePostgresPayPalAWSAzureOracleMicrosoft Android Linux Ubuntu macOS Windows Apache Apache Tomcat Apple Nginx Play Store F Droid App Store GitHub Xbox

malwoverview

2026-03-30 Python ★ 3712

AI Summary: Malwoverview is a versatile malware analysis tool designed for cybersecurity professionals to visualize and understand malware architecture without submitting samples to external endpoints, thereby ensuring compliance with Non-Disclosure Agreements. Its primary use case involves generating detailed reports on malware characteristics, and it offers a variety of analysis features, including dynamic and static analysis capabilities, and an intuitive user interface for enhanced usability. The tool is free and open-source, allowing users to modify and redistribute it under the GNU General Public License.

mantis

2026-03-30 Python ★ 1020

AI Summary: Mantis is a command-line framework that automates the processes of asset discovery, reconnaissance, and scanning for vulnerabilities. It efficiently identifies subdomains, certificates, and active assets, culminating in comprehensive scans for misconfigurations and secrets using a combination of open-source and custom tools. Notable features include distributed scanning capabilities, customizable scans, a dashboard for vulnerability management, and integration with various DNS services.


README

FeaturesModulesInstallationCommand Line OptionsDocumentationContributorsJoin Discord

matkap

2026-03-30 Python ★ 930

AI Summary: Matkap is a cybersecurity tool designed for the analysis of malicious Telegram bots, primarily intended for educational and research purposes. It integrates with FOFA and URLScan to search for leaked bot tokens and chat IDs, allowing users to monitor and log Telegram interactions while offering functionalities to export harvest messages. Notable features include the ability to forward messages from malicious bots and comprehensive logging capabilities for monitoring bot tokens across various platforms.

metabigor

2026-03-30 Go ★ 1498

AI Summary: Metabigor is an open-source intelligence (OSINT) tool designed for various information-gathering tasks without the need for API keys. It features capabilities such as network discovery, subdomain enumeration through certificate transparency logs, IP enrichment with Shodan InternetDB, and the ability to detect CDNs or WAFs, making it versatile for cybersecurity research and analysis. Notably, it allows users to automate input processing and batch queries for efficient data collection and analysis.

MetaOSINT.github.io

2026-03-30 HTML ★ 799

AI Summary: MetaOSINT is an open-source intelligence aggregation tool designed to assist OSINT practitioners in efficiently identifying and accessing relevant publicly available tools and resources. Its primary purpose is to streamline investigations by providing a curated list of top tools, significantly enhancing the speed and effectiveness of research and analysis. Notable features include an intuitive interface for surfacing resources and the ongoing community contribution model that allows users to submit additional tools.

mihari

2026-03-30 Ruby ★ 933

AI Summary: Mihari is an OSINT query aggregator designed for threat hunting, enabling users to perform multiple searches across various data services using a single rule and store the findings in a database. It supports numerous services, including Censys, VirusTotal, and Shodan, facilitating comprehensive data collection and analysis for enhanced cybersecurity investigations. Notable features include support for diverse OSINT sources, integrated persistence for findings, and robust documentation for user guidance.

MISP

2026-03-30 PHP ★ 6207

AI Summary: MISP is an open-source threat intelligence sharing platform designed for incident analysts and cybersecurity professionals to collect, store, and share information regarding cyber threats and incidents. Its notable features include a comprehensive database for managing both technical and non-technical data, a flexible reporting system, and an automatic correlation engine that identifies relationships among threat indicators, enhancing collaboration within the security community. MISP supports integration with various security systems such as NIDS and SIEMs to facilitate efficient threat response and analysis.

mitaka

2026-03-30 TypeScript ★ 1754

AI Summary: Mitaka is a browser extension designed to facilitate OSINT (Open Source Intelligence) searches and scans by automating the selection and refanging of indicators of compromise (IoCs). It supports over 65 services and various IoCs including domains, email addresses, and cryptographic hashes, enhancing the efficiency of threat intelligence gathering and analysis for cybersecurity professionals. Notable features include automatic IoC parsing and integration with multiple search engines for quick data retrieval.

mosint

2026-03-30 Go ★ 5774

AI Summary: Mosint is an automated Open Source Intelligence (OSINT) tool designed for efficient email investigations and scanning. It consolidates various services to validate emails, check for social media accounts, investigate data breaches, and extract associated information rapidly, all while being lightweight and user-friendly. Notable features include email verification, data breach checks, Pastebin scans, DNS/IP lookups, and the ability to output results in JSON format.


README

mosint

FeaturesInstallationServicesUsageDockerConfigScreen

Mr.Holmes

2026-03-30 Python ★ 3182

AI Summary: Mr.Holmes is an OSINT information gathering tool designed for collecting data about domains, usernames, and phone numbers using publicly available resources and Google dorks. Notable features include the use of proxies for anonymous requests and integration with a WhoIS API for enhanced domain information retrieval. The tool is aimed at educational and research purposes, although accuracy may vary.


README

n0kovo_subdomains

2026-03-30 ★ 773

AI Summary: n0kovo_subdomains is a comprehensive subdomain enumeration wordlist containing 3,000,000 entries sourced from SSL certificate data across the entire IPv4 space. This tool is designed to enhance the efficacy of subdomain discovery activities for penetration testing and security assessments, utilizing a robust dataset that offers a balanced trade-off between size and search effectiveness. Users can leverage this highly efficient wordlist to improve the success rate of finding subdomains in various target domains.

netlas-cookbook

2026-03-30 Python ★ 849

AI Summary: The Netlas Cookbook serves as a comprehensive guide for utilizing Netlas Search Tools, aimed at audiences with varying levels of cybersecurity knowledge. It provides practical examples and automation techniques for searching and analyzing IP addresses and domain data on the Internet, while also detailing the use of the Netlas API for advanced queries and OSINT tasks. Key features include search query syntax explanation, logical operators, and integration with Python, enhancing user capabilities in attack surface management and information retrieval.

Nettacker

2026-03-30 Python ★ 4989

AI Summary: OWASP Nettacker is an automated penetration testing and information-gathering framework designed for cybersecurity professionals to conduct reconnaissance, vulnerability assessments, and network security audits. Key features include a modular architecture for customizable task execution, support for multi-protocol and multithreaded scanning, comprehensive output formats, and a user-friendly interface for managing scans, all of which enhance its efficacy in identifying weaknesses across diverse systems and applications.


README

OWASP Nettacker

Build Status Apache License Twitter GitHub contributors Documentation Status repo size Docker Pulls

nomore403

2026-03-30 Go ★ 1567

AI Summary: NoMore403 is a specialized tool for cybersecurity professionals aimed at bypassing HTTP 40X errors during web security assessments. It employs multiple techniques such as header manipulation, method tampering, and custom path testing to automate the bypass process, featuring smart output filtering to highlight significant results and high concurrency for efficient testing. Notable capabilities include auto-calibration, deduplication of results, color-coded output, and customizable payloads for enhanced flexibility.


README

logo

NoMore403

GitHub stars GitHub forks Go Report Card Go version License: MIT Contributions welcome

o365recon

2026-03-30 PowerShell ★ 732

AI Summary: o365recon is a PowerShell script designed for retrieving information from Office 365 and Azure AD using valid credentials. Its primary use case is to facilitate information gathering for security assessments, with a notable feature allowing optional Azure querying through a simple command-line interface. The tool requires the installation of MSOnline and AzureAD modules and includes support for multi-factor authentication.


README

o365recon

script to retrieve information via O365 and AzureAD with a valid cred

obsidian-osint-templates

2026-03-30 ★ 752

AI Summary: The Obsidian OSINT Templates provide structures and frameworks for organizing data during Open Source Intelligence (OSINT) investigations using the Obsidian notetaking tool. Notable features include customizable templates designed to enhance data recording and connection-making, which facilitate efficient analysis and documentation of investigative findings. This resource aims to support both new and experienced users in effectively leveraging Obsidian for their OSINT needs.


README

obsidian-osint-templates

[!info] License Copyright (c) 2024 Micah Hoffman

Offensive-OSINT-Tools

2026-03-30 ★ 1145

AI Summary: Offensive-OSINT-Tools is a curated collection of essential tools tailored for Offensive Security specialists engaged in penetration testing and red teaming. It streamlines the OSINT process by categorizing tools for various purposes, including domain investigation, email address collection, and information gathering. Notable features include the ability to efficiently search for subdomains and URLs, along with a focus on usability by providing only the most relevant tools, rather than an overwhelming list.

ohshint.gitbook.io

2026-03-30 HTML ★ 915

AI Summary: OH SHINT is an informational blog focused on open-source intelligence (OSINT) and related topics, including operational security, surveillance, and counter-surveillance techniques. The blog aims to document various resources, tools, and methods for conducting OSINT investigations while sharing insights from the author’s expertise as a licensed private investigator. Notable features include comprehensive write-ups, guides, and resources that cover a wide array of intelligence-related subjects, catering to both amateurs and professionals in the field.

On-Chain-Investigations-Tools-List

2026-03-30 ★ 1865

AI Summary: The On-Chain Investigations Tools List is a comprehensive repository designed for conducting thorough investigations into blockchain-related activities. Its primary use case is to provide a curated compilation of tools and resources for tracking crypto hacks, security incidents, and on-chain analysis, featuring various utilities for data analysis, such as Nansen, Dune, and Metasleuth. Notable features include diverse categories of tools, a knowledge hub, and educational articles that guide users in developing effective investigative methodologies.

OneDorkForAll

2026-03-30 ★ 786

AI Summary: OneDorkForAll is an extensive compilation of Google dorks sourced from platforms such as Google, Shodan, and GitHub, specifically aimed at cybersecurity professionals and bug bounty hunters. It encompasses over 1 million dorks related to various vulnerabilities including LFI, SQL injection, and XSS, as well as job search techniques, and includes sensitive data reconnaissance methods for exposed configuration files, directories, and database files. Notably, it also includes dark web dorks for educational purposes, promoting responsible use of the information provided.

onedrive_user_enum

2026-03-30 Python ★ 747

AI Summary: onedrive_user_enum is a tool designed for enumerating valid OneDrive users by leveraging the HTTP response codes from file share URLs. Its primary use case is passive user enumeration, which avoids direct login attempts, making it less detectable by the target organization. Notable features include options for remote logging to MySQL, local SQLite database support, user list truncation, and mechanisms for de-duplication and user list management.


README

onedrive_user_enum v2.10

enumerate valid onedrive users

OnionSearch

2026-03-30 Python ★ 1651

AI Summary: OnionSearch is a Python3 script designed for scraping URLs from various “.onion” search engines, facilitating access to hidden services on the Tor network. It supports multiple search engines and features options for proxy configuration, output file management, and multi-processing capabilities to enhance scraping efficiency. The tool is intended for educational use, enabling users to perform searches with customizable parameters while maintaining optimal performance.


README

OnionSearch

👋 Hi there! For any professional inquiries or collaborations, please reach out to me at: megadose@protonmail.com

open-semantic-search

2026-03-30 Shell ★ 1161

AI Summary: Open Semantic Search is an integrated search server and ETL framework designed for comprehensive document processing, including crawling, text extraction, text analysis, and named entity recognition—fully supporting various search functionalities such as fulltext, faceted, exploratory, and knowledge graph searches. Notable features include Docker container support, the ability to generate search user interfaces, and extensive automated testing capabilities, enabling seamless integration and deployment. This tool is particularly valuable for organizations needing robust, customizable search solutions across diverse data types and sources.

opencve

2026-03-30 Python ★ 2624

AI Summary: OpenCVE is a Vulnerability Intelligence Platform designed to efficiently monitor and manage Common Vulnerabilities and Exposures (CVEs). It provides features such as aggregation from multiple sources, customizable filtering, alert subscriptions, and collaboration tools for tracking CVE progress within teams. Notable functionalities include AI-driven enrichment, customizable dashboards, and detailed reporting capabilities to streamline vulnerability management processes.


README

OpenCVE

Tests Python versions Code style: black

What is OpenCVE?

OpenCVE is a Vulnerability Intelligence Platform that helps you monitor and manage CVEs efficiently.

opensquat

2026-03-30 Python ★ 942

AI Summary: openSquat is an open-source intelligence (OSINT) tool designed to identify cyber squatting threats against brands or domains. It leverages advanced detection techniques, such as similarity detection using the Levenshtein distance algorithm, and integrates with services like VirusTotal for domain reputation checks. Key features include daily updates on newly registered domains, DNS validation, and multiple output formats, enhancing its utility for security professionals monitoring potential domain-related threats.


README

openSquat Logo

operative-framework

2026-03-30 Rust ★ 744

AI Summary: Operative Framework is a digital investigation tool designed for interacting with multiple targets, executing a variety of modules, and managing links with these targets. Its notable features include the ability to export reports in PDF format, support for crafting custom modules, and a RESTful API for integration, all underpinned by a redesigned architecture in Rust for enhanced performance and functionality.


README

operative framework is a digital investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.

osi.ig

2026-03-30 Python ★ 1486

AI Summary: OSI.IG is an open-source tool designed for conducting Open Source Intelligence (OSINT) on Instagram accounts by retrieving detailed user information, including profile data, hashtags, mentions, and post metadata. Notable features include the ability to extract user ID, follower counts, and engagement metrics, as well as accessing post details, although it currently struggles with posts marked as sensitive content. The tool aims to work without login credentials, providing a streamlined method for information gathering on Instagram profiles.

osint-brazuca

2026-03-30 ★ 2357

AI Summary: OSINT Brazuca is a comprehensive repository designed to aggregate open-source intelligence (OSINT) resources specifically relevant to Brazil. Its primary use case is to facilitate the gathering and analysis of publicly available information from various websites and portals, enhancing research and investigative efforts in fields like journalism and cybersecurity. Notable features include a structured collection of sources, adherence to legal guidelines such as the Brazilian General Data Protection Law (LGPD), and best practice recommendations for ethical information use.

osint-brazuca-regex

2026-03-30 ★ 970

AI Summary: OSINT Brazuca Regex is a repository designed to compile an extensive set of regular expressions tailored for open-source intelligence (OSINT) purposes, specifically focusing on data pertinent to Brazil. It encompasses regex patterns for various categories such as personal identification documents, cryptocurrency wallets, and banking information, all provided in a convenient JSON format for easy integration into tools and scripts. Notable features include coverage of Brazilian documents like CPF and CNPJ, as well as generic regex applicable across different contexts.

OSINT-Cheat-sheet

2026-03-30 HTML ★ 1833

AI Summary: The OSINT Cheat Sheet is a comprehensive resource that aggregates various open-source intelligence (OSINT) tools, datasets, and tips for effective information gathering. It serves as an educational guide, emphasizing safe usage practices and the importance of risk management when utilizing both free and paid tools. Notably, it includes advice on using virtual environments, enhancing privacy measures, and strategies for engaging with OSINT resources responsibly.


README

OSINT CHEAT SHEET - List OSINT Tools Github Badge

image

OSINT-Framework

2026-03-30 JavaScript ★ 11125

AI Summary: The OSINT Framework is a comprehensive resource designed to assist users in gathering information from free online sources for open-source intelligence (OSINT) applications. Its primary use case is to facilitate the discovery of various tools and resources that aid in information security and beyond, while notable features include a structured categorization of tools, some requiring local installation, and links to Google Dorking resources. The framework encourages community contributions for expanding its database of OSINT resources.

osint-tools

2026-03-30 ★ 1180

AI Summary: The OSINT tools repository provides a comprehensive collection of 308 scripts and tools designed for Open Source Intelligence (OSINT) investigations. Users can select tools based on various input data types across numerous categories, including account identifiers, file types, and network analysis. Notable features include easy navigation through categorized tools and the ability to access the latest version of each tool by modifying the repository commit reference.


README

OSINT tools

Various OSINT tools and scripts, total 308 repos.

OSINT-Tools

2026-03-30 ★ 737

AI Summary: OSINT-Tools is a curated collection of open-source intelligence (OSINT) tools aimed at facilitating the gathering and analysis of publicly available information. It includes a variety of tools for data extraction, reconnaissance, metadata analysis, and geolocation, with notable options like Maltego for link analysis, Recon-ng for web-based reconnaissance, and SpiderFoot for footprinting. The repository encourages contributions through pull requests, providing a collaborative platform for enhancing OSINT resources.


README

OSINT-Tools

:eyes: Some of my favorite OSINT tools.

Osintgram

2026-03-30 Python ★ 12541

AI Summary: Osintgram is a Python-based OSINT tool designed for reconnaissance on Instagram, enabling users to collect and analyze public data from Instagram accounts by username. Key features include retrieving followers, followed accounts, post information, comments, captions, and downloading media such as photos and stories. The tool operates through an interactive shell, providing a comprehensive suite of commands for in-depth investigation while emphasizing the importance of ethical usage.


README

Osintgram 🔎📸

version-1.3 GPLv3 Python3 Telegram Docker

osmedeus

2026-03-30 Go ★ 6163

AI Summary: Osmedeus is a security-focused orchestration engine designed for automating complex workflows through declarative YAML definitions, enhancing the audibility and management of security tasks. It features distributed execution, a rich library of over 80 utility functions, and supports cloud infrastructure provisioning for robust penetration testing and scanning. Key functionalities include event-driven scheduling, agentic LLM integration for tool orchestration, and a REST API for seamless integration and visualization through a web interface.

ParamSpider

2026-03-30 Python ★ 3030

AI Summary: ParamSpider is a tool designed for fetching and filtering URLs from Wayback Machine archives, specifically targeting domains for bug hunting, fuzzing, and further probing. Its notable features include the ability to ignore less relevant URLs, support for multiple domains, proxy configuration, and the option to introduce placeholders for parameter values, enhancing the efficiency of security assessments.


README

paramspider

Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

📖 About🏗️ Installation⛏️ Usage🚀 Examples🤝 Contributing

penetration-testing-cheat-sheet

2026-03-30 PHP ★ 802

AI Summary: The Penetration Testing Cheat Sheet is a comprehensive checklist designed to assist cybersecurity professionals in performing penetration testing tasks. It aggregates various tools and techniques for phases such as reconnaissance, scanning, and vulnerability exploitation, while emphasizing the importance of complementarity among tools for better results. Noteworthy features include automation of certain tasks and links to crucial resources for penetration testing methodologies.


README

Penetration Testing Cheat Sheet

This is more of a checklist for myself. May contain useful tips and tricks.

pentest-tools

2026-03-30 Python ★ 3285

AI Summary: pentest-tools is a collection of customizable security scripts designed for quick penetration testing needs, facilitating various tasks in security assessments. Notable features include domain enumeration, CORS vulnerability testing, subdomain extraction, and DNS requests handling, all provided in multiple programming languages such as Bash, Python, and PHP for versatile usability. This toolkit streamlines common pentesting workflows with efficient tools aimed at both novice and experienced security professionals.


README

pentest-tools

A collection of custom security tools for quick needs.

bash badge python badge php badge MIT license badge twitter badge

phishing_catcher

2026-03-30 Python ★ 1796

AI Summary: Phishing Catcher is a tool designed to identify potentially phishing domains in real-time by analyzing suspicious TLS certificate issuances reported to the Certificate Transparency Log via the CertStream API. It utilizes a configurable scoring system to evaluate domain names based on specific keywords and thresholds, allowing users to customize the sensitivity of detection. Notable features include a YAML configuration for adjustable scoring properties, support for both Python versions, and the ability to run in a Docker container for simplified deployment.

phoneinfoga

2026-03-30 Go ★ 16130

AI Summary: PhoneInfoga is an advanced information-gathering framework specifically designed for scanning international phone numbers. Its primary use case involves collecting detailed information such as country, area, carrier, and line type, while employing various OSINT techniques to uncover more about the phone number in question. Notable features include a graphical user interface for scans, programmatic access through a REST API, and the ability to check for the existence of a number and its associated reputation across different platforms.

Phunter

2026-03-30 Python ★ 997

AI Summary: Phunter is a sophisticated tool designed for information retrieval related to phone numbers, enabling users to identify details such as the operator, potential locations, line type, and reputation. It features several capabilities including checks for spam activity, Amazon account linkage, and ownership verification, with functionality for both single-number queries and bulk processing from files. The tool is intended for educational purposes and offers a command-line interface with various output options.

power-pwn

2026-03-30 Python ★ 1136

AI Summary: Power Pwn is a comprehensive offensive and defensive security toolset designed for the Microsoft 365 Power Platform and AI services. It includes multiple features such as tenant scanning with PowerDump, backdoor deployment, malware creation without coding, and tools for phishing and misconfiguration testing, providing users with extensive capabilities for security assessment and exploitation in Power Platform environments. Additionally, it offers utilities for enumerating custom GPTs and publicly exposed AI services, enhancing its utility for security professionals.

Powerful-Plugins

2026-03-30 ★ 892

AI Summary: Powerful Plugins is a curated collection of open-source plugins designed to enhance various frameworks and tools such as BurpSuite, Chrome, Firefox, IDA, Immunity, OllyDbg, and the Volatility Framework. Its primary use case is to extend the functionality of these platforms, enabling improved capabilities in tasks such as web application security testing and memory analysis. Notable features include the diverse range of supported tools and the invitation for community contributions to further expand the repository.

pwnedOrNot

2026-03-30 Python ★ 2520

AI Summary: pwnedOrNot is an OSINT tool designed to check if email accounts have been compromised and retrieve associated passwords from public data dumps. It leverages the HaveIBeenPwned v3 API for initial breach verification and subsequently searches for compromised passwords. Key features include detailed breach information, the ability to filter results by domain, and support for batch processing of multiple email addresses.


README

OSINT Tool for Finding Passwords of Compromised Email Accounts

Created by Lohitya Pushkar (thewhiteh4t).
Twitter - Blog

Raccoon

2026-03-30 Python ★ 3525

AI Summary: Raccoon is an offensive security tool designed for reconnaissance and information gathering, offering a wide range of features like DNS enumeration, WHOIS lookup, TLS data analysis, port scanning, and directory fuzzing. With support for asynchronous scanning via Python’s asyncio and anonymity through Tor/proxies, it provides efficient and robust scanning capabilities while organizing outputs by target and scan type. Additionally, it leverages default wordlists from SecLists for various reconnaissance tasks, enhancing its operational effectiveness.

Ransomware-Tool-Matrix

2026-03-30 ★ 1337

AI Summary: The Ransomware Tool Matrix repository provides an extensive catalog of tools utilized by various ransomware gangs, enabling cybersecurity defenders to identify and mitigate threats effectively. This resource can be leveraged for threat hunting, incident response, and adversary emulation by tracking the tools’ usage patterns and associated tactics, techniques, and procedures (TTPs). Notable features include categorized lists of tools—including those for credential theft, defense evasion, and networking—as well as links to relevant threat intelligence reports and resources.

rapidscan

2026-03-30 Python ★ 2049

AI Summary: RapidScan is a multifaceted web vulnerability scanner that automates the execution of various security scanning tools to efficiently uncover and assess vulnerabilities in web applications. Notable features include its one-step installation, support for multiple tools like nmap and nikto, the ability to correlate results to reduce false positives, and the provision of detailed vulnerability definitions and remediation strategies. The tool is designed to streamline the penetration testing process, saving valuable time while offering comprehensive reporting and future plans for AI-driven tool deployment based on detected issues.

reconmap

2026-03-30 JavaScript ★ 919

AI Summary: Reconmap is an open-source penetration testing management and automation platform that aids security professionals throughout the engagement lifecycle by efficiently planning, executing, and reporting on security assessments. Its notable features include real-time execution and scheduling of security commands, automated output capture, vulnerability tracking, and the generation of professional reports in multiple formats, all aimed at streamlining workflows and enhancing collaboration among InfoSec teams.


README

Reconmap

Bluesky YouTube Channel Subscribers

Reconnoitre

2026-03-30 Python ★ 2189

AI Summary: Reconnoitre is a reconnaissance tool designed for automating information gathering and service enumeration tailored for OSCP labs. Its primary use case involves creating a structured directory for storing results, findings, and recommended commands for each target host while offering features like DNS and SNMP sweeps, service scanning, and virtual host discovery using customizable wordlists. The tool emphasizes ease of use and flexibility, allowing users to execute tailored reconnaissance operations efficiently.

ReconPi

2026-03-30 Shell ★ 727

AI Summary: ReconPi is a lightweight reconnaissance tool designed for extensive domain analysis and asset discovery using a Raspberry Pi or a VPS. Its primary functionality includes resolving domain names, subdomain enumeration, vulnerability scanning using Nmap, and integrating tools like Nuclei for template-based security assessments. Notable features include automated reporting, Slack notifications, and easy installation through a straightforward script, making it accessible for cyber reconnaissance tasks.


README

Recon Pi

__________                          __________.__ 
\______   \ ____   ____  ____   ____\______   \__|
 |       _// __ \_/ ___\/  _ \ /    \|     ___/  |
 |    |   \  ___/\  \__(  <_> )   |  \    |   |  |
 |____|_  /\___  >\___  >____/|___|  /____|   |__|
        \/     \/     \/           \/             
                            
			v2.2 - @x1m_martijn 

ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.

redamon

2026-03-30 Python ★ 1672

AI Summary: RedAmon is an autonomous AI framework designed for seamless cybersecurity operations that integrate reconnaissance, exploitation, and post-exploitation processes into a streamlined pipeline. It stands out by automatically triaging findings, applying code fixes, and generating pull requests in repositories, ensuring human oversight at critical junctures. Its notable features include support for over 38 security tools, integration with major vulnerability scanners, and configurable autonomy to adapt to various security assessment needs.

rengine

2026-03-30 HTML ★ 8533

AI Summary: reNgine is a comprehensive web reconnaissance and vulnerability scanning tool aimed at security professionals, penetration testers, and bug bounty hunters. It features a highly configurable engine, data correlation capabilities, continuous monitoring, and a database-backed reconnaissance system, with the latest update including enhancements like a bounty hub integration, subdomain enumeration tools, and customizable reporting templates. This tool streamlines the reconnaissance process, enhancing efficiency and effectiveness in identifying vulnerabilities across web applications.

robin

2026-03-30 Python ★ 4602

AI Summary: Robin is an AI-powered OSINT tool designed for conducting investigations on the dark web, utilizing language models to enhance query refinement and result filtering from various dark web search engines. Its notable features include modular architecture for easy integration of new components, multi-model support for flexible AI interactions, a Streamlit-based web UI for user-friendly navigation, and robust reporting capabilities to save investigation outputs. It is recommended to be deployed using Docker for isolated and efficient operation.

SatIntel

2026-03-30 Go ★ 869

AI Summary: SatIntel is an OSINT tool designed for satellite reconnaissance, built with Golang. It enables users to extract satellite telemetry, receive orbital predictions, and parse Two Line Elements (TLE) using a command-line interface that integrates with APIs from Space Track and N2YO. Notable features include satellite catalog retrieval, telemetry display, visual and radio orbital predictions, and user-friendly authentication through environmental variables.


README

SatIntel

 .       .                   .       .      .     .      .                      .              .
    .           .            .     ________
                  .               /////////                .         .      .       .       .          .
        .   ________   .  .      /////////     .    .
           |.____.  /\         /////////    .                      .               .               .
  .       //      \/  |\     /////////
         //          \ |  \ /////////         _______ _______ _______ _____ __   _ _______ _______       .
        ||           | |  ///////// .     .   |______ |_____|    |      |   | \  |    |    |______ |
   .    ||           | |//  /////             ______| |     |    |    __|__ |  \_|    |    |______ |_____  .
        \\         / //     \/   .
          \\.___./ //\      ,_\     .     .                                                            .
  .       .    \ //////\   /    \                 .    .      Satellite OSINT CLI Tool          .            .
          .    ///////// \|      |    .
       .      ///////// .  \ __ /          .               Made by Angelina Tsuboi (G4LXY)              .
 .           /////////                              .               .                   .
   .   .    /////////     .     .                           .                   .                   .     .
           --------   .                  ..             .               .                .
    .        .         .                       .                                 .                .

SatIntel is a OSINT tool for satellite reconnaissance made with Golang. The tool can extract satellite telemetry, receive orbital predictions, and parse TLEs.

Features

  • Satellite Catalog Retrieval from NORAD ID or Selection Menu
  • Display Satellite Telemetry
  • Visual and Radio Orbital Predictions
  • Parse Two Line Elements (TLE)

Preview

SatIntel Image

Usage

Make an account at Space Track save username and password.

scan4all

2026-03-30 Go ★ 5976

AI Summary: scan4all is a versatile cybersecurity tool designed for automated web scanning and vulnerability detection, integrating various tools such as vscan, nuclei, and subfinder. It supports a wide range of protocols for password blasting and includes built-in detection capabilities for over 15,000 proof-of-concept (PoC) exploits. Built on Golang, it is cross-platform, lightweight, customizable, and features intelligent scanning mechanisms that optimize performance while ensuring comprehensive coverage of vulnerabilities.


README

Twitter Follow on Twitter GitHub Followers 💬

Scavenger

2026-03-30 Python ★ 766

AI Summary: Scavenger is an OSINT bot designed to search for sensitive data leaks on paste sites, specifically targeting credentials, private keys, configuration files, and other sensitive information. It features customizable search terms, two operational modes (scraping archives and tracking users), and the ability to scan local folders for sensitive data. The bot effectively organizes crawled pastes into different directories based on detection outcomes, facilitating efficient data management.


README

Scavenger - OSINT Bot - REWORKED


bot in action

scilla

2026-03-30 Go ★ 1225

AI Summary: Scilla is an information gathering tool designed for DNS, subdomains, ports, and directories enumeration. Its primary use case is for penetration testing, providing capabilities for extensive reconnaissance on target domains. Notable features include customizable wordlists for subdomain and directory enumeration, multiple output formats, and ease of installation through various methods such as Homebrew, Snap, and Docker.


README


🏴‍☠️ Information Gathering tool 🏴‍☠️ - DNS / Subdomains / Ports / Directories enumeration

go-report-card workflows
Coded with 💙 by edoardottt
Share on Twitter!

ScopeSentry

2026-03-30 Go ★ 1476

AI Summary: Scope Sentry is a versatile cybersecurity tool that provides functionalities such as asset mapping, subdomain enumeration, vulnerability scanning, and information leakage detection. Its primary use case is to facilitate comprehensive security assessments of web assets through a distributed scanning approach, allowing users to configure multiple scanning nodes. Notably, it features a plugin system for extensibility, supports multi-node scanning, and includes components for web monitoring and sensitive data leakage detection.

seekr

2026-03-30 Go ★ 760

AI Summary: Seekr is a multi-purpose toolkit designed for gathering and managing Open Source Intelligence (OSINT) data, featuring a streamlined web interface for data collection, organization, and analysis. Key functionalities include integration with popular OSINT tools, account discovery, customizable themes, and the absence of API keys for any features, making it suitable for researchers and investigators seeking to enhance their OSINT workflows. It is currently in beta development and allows for easy setup on various platforms including Windows, Linux, and Docker.

shhgit

2026-03-30 JavaScript ★ 3950

AI Summary: shhgit is a tool designed to enhance the security of development teams by identifying leaked secrets in code repositories, such as API tokens and private keys, before they can be exploited by malicious actors. It operates either by scanning public repositories via APIs of GitHub, GitLab, and BitBucket or processing local directories, and features a customizable search capability along with options for CSV reporting and entropy-based analysis. Notably, the tool is flexible for both cloud and local deployments, making it suitable for integration into CI/CD pipelines.

sicat

2026-03-30 Python ★ 826

AI Summary: SICAT is a comprehensive vulnerability and exploit finder that streamlines the reconnaissance process by aggregating data from multiple reputable databases based on user-defined keywords, Nmap scan results, or detected web technologies. Notable features include a modern web interface with real-time feedback, detailed HTML reporting with interactive elements, and intelligent keyword generation for enhanced search accuracy, all while supporting multithreaded scanning for optimized performance. This tool significantly aids security professionals in identifying vulnerabilities across various platforms and frameworks.

SIGIT

2026-03-30 Python ★ 936

AI Summary: SIGIT is a modular OSINT CLI tool designed for efficient collection of public information, supporting reconnaissance, security testing, and digital forensics tasks. Its architecture leverages asynchronous programming and parallel scanning to enable fast data gathering across 14 diverse tools, including username checks, IP location services, and SSL certificate analysis. Notable features include a user-friendly command-line interface and a design that minimizes resource leaks through automated session management.


README

SIGIT

Simple Information Gathering Toolkit - Modular OSINT CLI

sitedorks

2026-03-30 Python ★ 1023

AI Summary: SiteDorks is a versatile tool designed for conducting advanced searches across multiple search engines like Google and Bing using predefined dork lists. It simplifies the querying process by allowing users to categorize their search terms and automate input from a default list of 629 dorkable websites. Notable features include the ability to customize searches, manage multiple domain queries easily, and access regularly updated lists for specific countries and categories.

skanuvaty

2026-03-30 Rust ★ 923

AI Summary: Skanuvaty is a high-performance DNS/network/port scanning tool that allows users to quickly analyze a domain by discovering its subdomains and resolving their corresponding IPs. Notable features include support for concurrent scans, with the ability to test thousands of subdomains within seconds, and the generation of a comprehensive output file in JSON format for further analysis.


README

Skanuvaty

Dangerously fast dns/network/port scanner, all-in-one.

Demonstration

Start with a domain, and we’ll find everything about it.

sn0int

2026-03-30 Rust ★ 2417

AI Summary: sn0int is a semi-automatic OSINT framework and package manager designed for IT security professionals and researchers to gather intelligence on targets or themselves. It facilitates the enumeration of attack surfaces by processing public information through flexible, modular analysis tools and provides features such as subdomain harvesting, IP address enrichment, login breach discovery, and social media profile analysis. Its extensible architecture allows users to create and share custom modules, enhancing its versatility in investigations.

Sn1per

2026-03-30 Shell ★ 9634

AI Summary: Sn1per is an automated penetration testing and attack surface management tool that enhances vulnerability scanning by integrating both commercial and open-source scanners to identify hidden assets and vulnerabilities within an organization’s environment. It streamlines the security assessment process through automation, providing deep and continuous security insights suitable for organizations of all sizes. Notable features include its capability to discover and prioritize risks, saving time and resources in the vulnerability management lifecycle.

social-analyzer

2026-03-30 JavaScript ★ 22346

AI Summary: Social Analyzer is an OSINT tool designed to analyze and locate a person’s profiles across over 1000 social media platforms via an API, CLI, or web application. Its primary use case includes investigating potential malicious activities like cyberbullying and misinformation dissemination through sophisticated detection modules that yield a confidence rating. Notable features include multi-profile searches, various detection techniques (such as OCR and advanced algorithms), and customizable queries for enhanced data extraction and analysis.

Social-Media-OSINT

2026-03-30 ★ 787

AI Summary: Social-Media-OSINT is a comprehensive resource tool designed for open-source intelligence (OSINT) gathering on various social media platforms and messenger applications. Its primary use case includes providing links to tools, techniques, and methodologies for effective information extraction and analysis across platforms such as Facebook, Instagram, LinkedIn, and more. Notable features include extensive categorization of social media types and resources for advanced analytics on topics like hate speech and disinformation.

Social-Media-OSINT-Tools-Collection

2026-03-30 ★ 1716

AI Summary: The Social-Media-OSINT-Tools-Collection is a comprehensive repository aimed at providing tools for gathering open-source intelligence (OSINT) specifically from social media platforms. Its primary use case involves enabling users to track and analyze information from various social media sites such as Facebook, Instagram, and Twitter, utilizing features like link checkers, keyword searches, and profile lookups. Notable features include monitoring public mentions, recovering accounts, and various specialized search tools that enhance intelligence gathering capabilities.

socid-extractor

2026-03-30 Python ★ 926

AI Summary: socid-extractor is a command-line tool and Python library designed for extracting user profile data from various social media and web platforms, storing the information in a machine-readable format. Supporting over 100 methods for different sites, it enables users to retrieve details such as usernames, links, and personal attributes, facilitating use cases in OSINT and user tracking. Notable features include the ability to skip HTTP requests for unknown URLs, batch processing options, and integration capabilities for broader investigative workflows.

SpiderSuite

2026-03-30 ★ 943

AI Summary: SpiderSuite is an advanced cross-platform web crawling tool specifically crafted for security professionals, facilitating comprehensive web audits and vulnerability assessments. Notable features include ease of installation, user-friendly documentation, and a feature-rich environment tailored for first-time users. The tool aims to enhance security testing processes through efficient crawling capabilities.


README

GitHub all releases downloads count

Roadmap

SpiderSuite is an advance cross-platform and multi-feature web crawler designed for security professionals. For more information visit SpiderSuite’s website.

sublert

2026-03-30 Python ★ 1028

AI Summary: Sublert is a Python-based security tool designed for monitoring new subdomains associated with specific organizations by leveraging certificate transparency. It facilitates automated alerts to a Slack workspace for newly identified subdomains and includes functionalities for DNS resolution to verify active subdomains. Key features include periodic monitoring, configuration options for concurrent threads, and logging capabilities.


README

                                   _____       __    __          __
                                  / ___/__  __/ /_  / /__  _____/ /_
                                  \__ \/ / / / __ \/ / _ \/ ___/ __/
                                 ___/ / /_/ / /_/ / /  __/ /  / /_
                                /____/\__,_/_.___/_/\___/_/   \__/

                                    Author: Yassine Aboukir
                                        Version: 1.4.7

subscraper

2026-03-30 Python ★ 940

AI Summary: SubScraper is a subdomain enumeration tool designed for penetration testers and bug bounty hunters, enabling the discovery of an organization’s attack surface through multiple techniques. It supports DNS resolution, HTTP(S) requests, and CNAME lookups, along with modular support for various data sources and the capability to handle multiple targets. Key features include compatibility with Windows CLI, output formatting in .txt or .csv, and easy extensibility to add new enumeration methods.

Sudomy

2026-03-30 Shell ★ 2353

AI Summary: Sudomy is a subdomain enumeration and analysis tool designed for advanced automated reconnaissance and OSINT activities. It features both active and passive enumeration methods, utilizing efficient techniques such as DNS brute-forcing via Gobuster and data collection from 22 curated third-party sources. Additional capabilities include subdomain testing, virtual host classification, port scanning, and technology identification, making it a comprehensive solution for penetration testing and bug bounty applications.


README

Sudomy

License Build Status Version Build Build Contributions Welcome Donate

taranis-ai

2026-03-30 Python ★ 982

AI Summary: Taranis AI is an advanced Open-Source Intelligence (OSINT) tool that utilizes Artificial Intelligence and Natural Language Processing to gather and enhance information from various unstructured data sources, primarily news articles. Its notable features include a streamlined workflow for analysts to convert unstructured data into structured reports, multi-format output capabilities, seamless publication of intelligence products, and experimental support for collaborative threat intelligence via integration with MISP.


README

Taranis AI

Logo

Telegram-OSINT

2026-03-30 ★ 1724

AI Summary: Telegram-OSINT is a comprehensive resource hub designed for open-source intelligence (OSINT) researchers focusing on the Telegram platform. It provides guides, tools, and best practices to ensure users maintain operational security (OPSEC) while gathering intelligence, including constructing virtual machines for safe research. Noteworthy features include links to various blogs, tools, and a transparency report bot, addressing the complexities of OSINT in a rapidly changing digital landscape.


README

Telegram-OSINT



telegram-scraper

2026-03-30 Python ★ 769

AI Summary: The Telegram Channel Scraper is a Python-based tool that enables users to scrape messages and media from Telegram channels using the Telethon library. Key features include real-time scraping, enhanced metadata capture such as message statistics and reactions, smart filtering for channel management, and data export capabilities in CSV and JSON formats. With automatic database migration and a user-friendly interactive menu, it supports efficient channel monitoring and data retrieval.

theHarvester

2026-03-30 Python ★ 15928

AI Summary: theHarvester is a reconnaissance tool designed for red team assessments and penetration tests, facilitating the gathering of open-source intelligence (OSINT). It collects various types of data such as names, emails, IP addresses, subdomains, and URLs from multiple public sources, enhancing a security professional’s understanding of a domain’s external threat landscape. Notable features include support for numerous passive modules that query different search engines and databases, enabling comprehensive domain analysis and threat enumeration.

TIDoS-Framework

2026-03-30 Python ★ 1848

AI Summary: TIDoS is an advanced offensive web application penetration testing framework designed to facilitate comprehensive security assessments by automating tasks across multiple phases, including reconnaissance, scanning, and vulnerability analysis. With over 100 modules and features such as multiprocessing for performance enhancement, a Metasploit-like console interface, and a graphical user interface, TIDoS streamlines the penetration testing process, enabling users to conduct efficient and thorough web application security assessments with minimal configuration. Additional capabilities like Tor integration further enhance anonymity during testing efforts.

tinfoleak

2026-03-30 Python ★ 1969

AI Summary: tinfoleak is an open-source tool designed for Twitter intelligence analysis, enabling automated extraction and analysis of data based on user identifiers, geographic coordinates, or keywords. It provides comprehensive insights into user activities, account relations, geolocation data, and engagement metrics, making it a valuable resource for intelligence analysts. Notable features include ability to analyze text and media, track user interactions, and monitor digital identities across social networks.


README

tinfoleak

The most complete open-source tool for Twitter intelligence analysis

tlosint-live

2026-03-30 HTML ★ 795

AI Summary: The tlosint-live repository provides a custom build configuration for a Kali Linux-based OSINT distribution tailored for Trace Labs. Its primary use case is to streamline the creation of a live OSINT environment, featuring a set of pre-configured tools and applications for data analysis, domain reconnaissance, and social media investigations. Notable features include an easily modifiable package list, integration of various OSINT tools, and the capability to generate a bootable ISO or OVA file for virtual environments.

tookie-osint

2026-03-30 Python ★ 2038

AI Summary: Tookie-OSINT is an open-source tool designed for username discovery across multiple online platforms, offering a straightforward user interface for ease of use. It aims to facilitate operational security and intelligence gathering for new programmers and penetration testers, achieving an approximately 80% success rate in finding user accounts. Notable features include full reimplementation for enhanced performance and multilingual support.


README

Tookie-osint-logo-newtext-480x480

GitHub contributors GitHub code size in bytes GitHub forks GitHub Repo stars Code style: black

top25-parameter

2026-03-30 ★ 1824

AI Summary: The “top25-parameter” repository provides a curated list of the 25 most commonly vulnerable parameters associated with various web security vulnerabilities, including Cross-Site Scripting (XSS), SQL Injection (SQLi), and Server-Side Request Forgery (SSRF). It is intended for use in both manual reconnaissance and automation tools, supported by data sourced from OSINT and articles in the cybersecurity community. Notable features include organized parameters for different vulnerabilities, aiding security researchers and practitioners in identifying and mitigating risks effectively.

TorBot

2026-03-30 Python ★ 3926

AI Summary: TorBot is an open-source intelligence tool designed for crawling and gathering data from .onion websites on the dark web. Its primary use case involves extracting page titles, saving links in a database, and visualizing link relationships, facilitating user insights into dark web resources. Notable features include the ability to check link status, customize crawling depth, and output results in various formats such as JSON and HTML.


README


                         ████████╗ ██████╗ ██████╗     ██████╗  ██████╗ ████████╗
                         ╚══██╔══╝██╔═══██╗██╔══██╗    ██╔══██╗██╔═████╗╚══██╔══╝
                            ██║   ██║   ██║██████╔╝    ██████╔╝██║██╔██║   ██║
                            ██║   ██║   ██║██╔══██╗    ██╔══██╗████╔╝██║   ██║
                            ██║   ╚██████╔╝██║  ██║    ██████╔╝╚██████╔╝   ██║
                            ╚═╝    ╚═════╝ ╚═╝  ╚═╝    ╚═════╝  ╚═════╝    ╚═╝

                            Open Source Intelligence Tool for the Dark Web

toutatis

2026-03-30 Python ★ 3819

AI Summary: Toutatis is a Python-based tool designed for extracting detailed information from Instagram accounts, such as emails, phone numbers, and user statistics. Its primary use case is to facilitate data retrieval for user analysis or account verification, utilizing either a username or an Instagram ID. Notable features include the ability to access both public and obfuscated contact details, alongside comprehensive profile metrics.


README

Toutatis

👋 Hi there! For any professional inquiries or collaborations, please reach out to me at: megadose@protonmail.com

trape

2026-03-30 Python ★ 8633

AI Summary: Trape is an OSINT analysis tool designed for real-time tracking and execution of social engineering attacks, primarily aimed at assisting government organizations, companies, and researchers in identifying cybercriminals. Key features include precise locator optimization, a REST API for remote website monitoring, and capabilities for executing phishing attacks, managing JavaScript injections, and analyzing target network information. The tool emphasizes stealth and user control, allowing for sophisticated manipulation of browser behavior to extract sensitive information covertly.

twitter-advanced-search

2026-03-30 ★ 1544

AI Summary: The Twitter Advanced Search tool enhances tweet discovery by leveraging various search operators that allow users to refine their queries based on content, hashtags, emojis, and more. Its primary use case is enabling users to perform intricate searches on Twitter’s web, mobile, and TweetDeck platforms, although it is not compatible with certain Twitter API versions. Notable features include support for boolean operators, wildcard searches, and the ability to exclude terms or phrases, significantly expanding the capabilities of standard Twitter search functionalities.

uDork

2026-03-30 Shell ★ 844

AI Summary: uDork is a Bash script designed for Google hacking, leveraging advanced search techniques to uncover sensitive information and detect web application versions without conducting direct attacks. The tool utilizes predefined dorks sourced from the Google Hacking Database, allowing users to find sensitive files, IoT devices, and security vulnerabilities efficiently. Notable features include speed improvements between requests and Docker support for easy deployment.


README

uDork - Google Hacking Tool

Author: M3n0sD0n4ld
Twitter: @David_Uton

News

11/06/2022

I have some bad news to give, last week Facebook withdrew the service by which the tool made the requests, unfortunately the tool no longer works.

Ukraine-Cyber-Operations

2026-03-30 YARA ★ 937

AI Summary: The Ukraine Cyber Operations repository provides curated threat intelligence resources specifically tailored for organizations in Ukraine, focusing on the ongoing cyber operations related to the Russia-Ukraine conflict. Notable features include a comprehensive timeline of monthly threat reports from 2022 and 2023, contextualized indicators of compromise (IOCs) contributed by the Equinix Threat Analysis Center, and vetted open-source intelligence (OSINT) sources, enhancing the situational awareness and response capabilities of users.

urlfinder

2026-03-30 Go ★ 855

AI Summary: URLFinder is a high-speed, passive URL discovery tool optimized for efficient web asset discovery without active scanning, making it particularly useful for penetration testers and security researchers. It features curated passive sources for comprehensive URL gathering, supports multiple output formats, and provides integration capabilities through STDIN/OUT support.


README

URLFinder

A high-speed tool for passively gathering URLs, optimized for efficient web asset discovery without active scanning.

FeaturesInstallationUsageExamplesJoin Discord

urlhunter

2026-03-30 Go ★ 1662

AI Summary: urlhunter is a reconnaissance tool designed for searching URLs exposed via URL shortener services like bit.ly and goo.gl. It utilizes collections published by the URLTeam, enabling users to perform keyword and regex searches on historical data with customizable date ranges and output options. Notable features include the ability to specify single or multiple keywords, regex searches, and support for bulk archive downloading, making it ideal for cyber intelligence and bug bounty applications.

Uscrapper

2026-03-30 Python ★ 773

AI Summary: Uscrapper Vanta is an open-source intelligence tool designed for advanced data extraction from both the surface web and the dark web, specifically targeting personal information such as email addresses, social media links, and geolocations. Notable features include keyword-based scraping for tailored data extraction, support for .onion domains, and comprehensive reporting capabilities, which transform raw data into actionable insights. The tool employs multithreading and anti-web scraping defenses to enhance its effectiveness in information gathering.

user-scanner

2026-03-30 Python ★ 1357

AI Summary: User Scanner is an advanced email and username OSINT tool designed to verify the registration status of emails and the availability of usernames across multiple platforms, including GitHub, X (formerly Twitter), Reddit, and Instagram. It features dual-mode usage for email and username scanning, supports bulk scanning, utilizes wildcard-based username permutations, and provides clear output formats such as JSON and CSV, along with proxy support for enhanced anonymity. The tool’s modular architecture allows for easy integration of new platforms, making it a versatile choice for security professionals and branding efforts.

UserFinder

2026-03-30 Shell ★ 1268

AI Summary: UserFinder is a shell-based tool designed for identifying users across various social media platforms and gathering additional information. It enables users to perform queries and compile data efficiently, featuring an easy installation process and a straightforward command-line interface. Notable features include a user-friendly script execution with minimal setup requirements and a focus on social profiling capabilities.


README

LicenseIssuesDeveloperWikipedia

Find user in social and more informations!

username-anarchy

2026-03-30 Ruby ★ 1346

AI Summary: Username Anarchy is a command-line tool designed for generating potential usernames during penetration testing, crucial for user account/password brute force attacks and username enumeration. It features a flexible plugin architecture for various username formats, utilizes common first and last names databases from external sources, and allows for name substitutions to maximize coverage when only partial user information is known. This tool supports input from multiple formats and automates name generation based on country datasets or popular social media aliases.

Watcher

2026-03-30 JavaScript ★ 1259

AI Summary: Watcher is an AI-powered automated cybersecurity threat detection platform built on Django and React JS, enabling organizations to proactively identify and monitor emerging cybersecurity threats. Its primary use case includes automated intelligence analysis, real-time alerts for trending cybersecurity topics, and comprehensive domain management to combat potential cyber threats. Notable features encompass information leak monitoring, malicious domain surveillance, and integration with external threat intelligence sources for enhanced situational awareness.

Web_Hacking

2026-03-30 ★ 760

AI Summary: Web Hacking is a comprehensive repository of notes focused on bug bounty hunting and penetration testing, collating various techniques for vulnerability discovery and exploitation. The tool features extensive reconnaissance and OSINT methods, a detailed list of common vulnerabilities, and bypass techniques, making it a valuable resource for security professionals seeking to enhance their skills and methodologies in web application security. Additionally, it encourages community contributions, fostering continuous improvement and updates of its content.

web-check

2026-03-30 TypeScript ★ 32529

AI Summary: 🕵️‍♂️ All-in-one OSINT tool for analysing any website

🕵️‍♂️ All-in-one OSINT tool for analysing any website

webcopilot

2026-03-30 Shell ★ 1278

AI Summary: WebCopilot is an automation tool for security assessments that enumerates subdomains of a target domain and scans for vulnerabilities such as XSS, SQLi, and RCE. It employs various open-source tools for subdomain enumeration, active scanning, endpoint crawling, and filtering of vulnerability parameters, ultimately presenting the results in a structured manner. Notable features include comprehensive subdomain enumeration, endpoint crawling, and integration with multiple vulnerability scanning tools.


README

WebCopilot

An automation tool that enumerate subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.

WhatBreach

2026-03-30 Python ★ 1534

AI Summary: WhatBreach is an OSINT tool designed to identify and aggregate data on email breaches from various sources, enabling users to assess the security status of one or multiple email addresses. Key features include integration with APIs like haveibeenpwned.com for breach detection, dehashed.com for database searches, and additional functionality for domain investigation and pastes analysis from platforms such as Pastebin. The tool also supports request throttling to prevent service blocking, customizable output directories for data downloads, and verification of email deliverability.

whatsapp-osint

2026-03-30 Python ★ 1312

AI Summary: WhatsApp Beacon is an OSINT tracking tool designed to monitor the online status of specific WhatsApp contacts, storing session data in SQLite for analysis. It features automated installation, headless operation, and advanced analytics capabilities, including exporting data to Excel and generating detailed HTML reports with visualizations. This tool emphasizes ethical use for educational and research purposes.


README

🕵️‍♂️ WhatsApp Beacon (OSINT Tracker)

PyPI License Python Platform

WhatsApp Beacon tracks when specific WhatsApp contacts go online and stores every completed session in SQLite. It can export to Excel, generate a polished analytics dashboard, and run fully headless once the session is authenticated.

WhatsMyName

2026-03-30 Python ★ 2411

AI Summary: WhatsMyName is an open-source tool designed for OSINT practitioners to identify whether specific usernames are registered on various websites, using a central JSON data file of accessible sites that adhere to specific URL format criteria. The project has shifted its focus from direct username checking scripts to maintaining and enhancing its dataset, which supports various third-party tools and extensions for username validation across diverse platforms. Notable features include community-driven contributions, compatibility with multiple user-checking tools, and the ability to integrate with user-friendly web interfaces and applications.

wholeaked

2026-03-30 Go ★ 1099

AI Summary: wholeaked is a Go-based file-sharing tool designed to identify the responsible individual in the event of a document leakage. It accomplishes this by creating a unique hidden signature for each recipient, which is embedded in the shared file, and offers integrations with services such as Sendgrid and AWS SES for automated file distribution. Key features include compatibility with various file types and enhanced functionality for common formats like PDF and DOCX, enabling both automated and manual sharing.

WinPwn

2026-03-30 PowerShell ★ 3653

AI Summary: WinPwn is a comprehensive PowerShell-based tool designed for internal penetration testing, emphasizing automation and proxy support for reconnaissance and exploitation tasks. Its notable features include modules for session management, credential dumping, local and domain reconnaissance, and privilege escalation checks, alongside the ability to operate offline and integrate well-known offensive security scripts. The tool streamlines the penetration testing process with an interactive menu for selecting various attack methods and extensive built-in reconnaissance capabilities.

WitnessMe

2026-03-30 Python ★ 762

AI Summary: WitnessMe is a versatile web inventory tool designed for efficient scanning and data gathering, primarily utilizing headless Chromium via the Pyppeteer library. It excels in processing large Nessus and NMap XML files, generates CSV and HTML reports, and features a RESTful API for remote scanning and extensibility to accommodate custom functionalities. With additional capabilities like HTTP proxy support, signature scanning through YAML files, and terminal screenshot previews, WitnessMe stands out for providing a comprehensive workflow without significant installation challenges.

wordlists

2026-03-30 ★ 1729

AI Summary: The Trickest Wordlists repository provides a collection of real-world information security wordlists, updated regularly for various technologies including popular CMS platforms and cloud assets. Its primary use case is to assist security professionals in penetration testing and vulnerability assessments by generating wordlists for directory bruteforcing and subdomain enumeration. Notable features include distinct wordlist formats for different scenarios, such as base and all levels for technology-based lists, as well as comprehensive data extracted from top websites’ robots.txt files and extensive subdomain inventories from public bug bounty programs.

worldmonitor

2026-03-30 TypeScript ★ 45288

AI Summary: World Monitor is an AI-driven real-time global intelligence dashboard that aggregates news, monitors geopolitical events, and tracks infrastructure within a comprehensive situational awareness interface. It features over 435 curated news feeds, dual map visualization capabilities with multiple data layers, and advanced cross-stream correlation for military, economic, and disaster signals, making it ideal for analysts seeking in-depth insights into global developments. Additional functionalities include a Country Intelligence Index and finance monitoring tools covering various asset classes.

wpprobe

2026-03-30 Go ★ 811

AI Summary: WPProbe is a rapid scanning tool designed to detect installed WordPress plugins and themes through REST API enumeration and HTML discovery, mapping them to known vulnerabilities. It supports multiple scanning modes, including stealthy, brute-force, and hybrid methods, allowing detection of over 5,000 plugins without brute-force and many more with it. The tool fetches an updated vulnerability database automatically, eliminating the need for an API key by default, while still allowing for custom configurations and output formats.

X-osint

2026-03-30 Python ★ 2024

AI Summary: X-osint is an open-source OSINT tool designed for gathering credible information related to phone numbers, email addresses, and IP addresses, with additional features planned for future updates. Notably, it includes functionalities for IP and email information gathering, metadata extraction from images and files, subdomain enumeration, and DNS lookups, among others. The tool is built using Python and Bash and is maintained actively, ensuring regular updates and enhancements.


README

X-osint

This is an osint tool which gathers useful and yet credible valid information about a phone number, user’s email address and ip address and more to come in future updates

xeuledoc

2026-03-30 Python ★ 998

AI Summary: xeuledoc is a Python tool designed for retrieving metadata and information from various types of public Google documents, including Google Drive files, Google Docs, Sheets, Slides, Drawings, My Maps, Apps Script, and Jamboard. Notable features include ease of installation via PyPI and GitHub, and the ability to handle multiple Google document formats, making it a versatile solution for information extraction from Google’s platform.


README

xeuledoc

PyPI PyPI - Downloads PyPI - License

Xteam

2026-03-30 Python ★ 1150

AI Summary: Xteam is a multifunctional tool designed for information gathering and security testing, primarily targeting Instagram data extraction, Android lockscreen cracking, and phishing methods. It includes features for wireless attacks and provides an update script to enhance its capabilities. The tool operates on Termux and Kali Linux, requiring no root access for installation.


README

Xteam tool


## Screenshot:

Features:

  • Insta information gathering
  • Crack android lockscreen interfaces
  • Phishing Hacks
  • Wireless attacks added
  • Update script
  • Remove script
  • more coming…

Requirements

  • Data connection

yark

2026-03-30 Python ★ 2173

AI Summary: Yark is a YouTube archiving tool designed to simplify the process of downloading and managing video content and metadata from YouTube channels. Its primary use case is to create and maintain local archives of videos, allowing users to refresh and view their collections offline, complete with timeline reports and commenting features. Notable features include an easy-to-use command line interface, support for rich history and stats visualization, and a robust directory-based archive structure that preserves deleted or private videos.

yesitsme

2026-03-30 Python ★ 2685

AI Summary: Yes, it’s me! is a Python-based Open Source Intelligence (OSINT) tool designed to locate Instagram profiles via name, email, or phone number. It effectively utilizes indexing from dumpor.com to fetch usernames associated with a specified name and compares them against provided obfuscated contact details, enabling streamlined online investigations. Notable features include multi-level match scoring, customizable request timeouts, and support for partial inputs to enhance user anonymity.


README

yesitsme logo

Zehef

2026-03-30 Python ★ 994

AI Summary: Zehef is an OSINT tool designed to gather public information on targeted email addresses. Its primary use case includes checking if an email is associated with any data breaches, pastes on platforms like Pastebin, and identifying linked social media accounts across various services. Notable features include email combination generation and integration with breach detection services like HudsonRock.


README

Z e h e f


python version license

Zehef is an osint tool who studies the emails 📩

😇 Abouts zehef

Zehef v2 is a tool focused on finding public information on a targeted email.