Hacking Tools

Collection with some of the best OSINT, Recon, and Offensive Security Tools

Used by the top elite hackers around the world.

Recon Tool: ReconSpider

Recon Tool: ReconSpider

ReconSpider is one of the most advanced Open Source Intelligence (OSINT) Framework and Recon for scanning IP Addresses, Emails, Websites, and Organizations and finding out information from different sources.

read more
Offensive Security Tool: ThreatMapper

Offensive Security Tool: ThreatMapper

ThreatMapper is a platform for runtime threat management and attack path enumeration in cloud-native environments. It actively hunts for threats in production platforms, ranking them based on their risk of exploitation. It reveals vulnerabilities, exposed secrets, and deviations from security best practices through a combination of agent-based inspection and agent-less monitoring.

read more
Recon Tool: subby

Recon Tool: subby

subby is an uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.

read more
Recon Tool: CHOMTE.SH

Recon Tool: CHOMTE.SH

CHOMTE.SH is a powerful shell script designed to automate recon tasks. It utilizes various Go-based tools to gather information and identify the attack surface, making it a valuable asset for bug bounty hunters and penetration testers.

read more
Offensive Security Tool: o365sprayer

Offensive Security Tool: o365sprayer

o365sprayer is a tool used to enumerate and spray passwords for Office 365 accounts on both Managed and Federated AD services. It has the ability to distinguish managed O365 and Federated Microsoft Office 365 accounts for a target domain.

read more
Recon Tool: fetchmeurls

Recon Tool: fetchmeurls

fetchmeurls is a Recon tool designed for Bug Bounty Hunters to quickly fetch URLs for multiple domains, either for small or large scopes, actively and passively.

read more
Offensive Security Tool: Noir

Offensive Security Tool: Noir

Noir is an attack surface detector for source code and it is designed for identifying API endpoints and potential security issues within web applications by analyzing their source code.

read more