Hacking Tools

Collection with some of the best OSINT, Recon, and Offensive Security Tools

Used by the top elite hackers around the world.

Recon Tool: Mantra

Recon Tool: Mantra

Mantra it’s a recon tool with the main objective of searching for API keys in JavaScript files and HTML pages.

read more
Recon Tool: Goblyn

Recon Tool: Goblyn

Goblyn is a versatile tool designed for the enumeration and extraction of metadata from files hosted on websites.

read more
Offensive Security Tool: Headerpwn

Offensive Security Tool: Headerpwn

Headerpwn is a fuzzing tool for finding anomalies and analyzing how servers respond to different HTTP headers. It can provide valuable insights into potential security risks and misconfigurations.

read more
OSINT Tool: Photon

OSINT Tool: Photon

Photon is an advanced web crawler and osint tool for thorough website analysis. It’s capable of scanning websites comprehensively to uncover valuable information.

read more
Recon Tool: Dirhunt

Recon Tool: Dirhunt

Dirhunt is a web crawler optimize for search and analyze directories. It detects directories with false 404 errors, directories where an empty index file has been created to hide things and much more.

read more
Offensive Security Tool: BruteSpray

Offensive Security Tool: BruteSpray

BruteSpray a tool that automates and accelerates the testing of weak credentials and passwords across multiple services, such as SSH, RDP, and FTP. BruteSpray operates by accepting a target list and a password list, and then efficiently launching brute force attacks against the specified services.

read more
Recon Tool: RecoX

Recon Tool: RecoX

Recox is a powerful tool for finding vulnerabilities in web applications. It goes beyond the OWASP top ten list, making it valuable for security professionals.

read more
Digital Forensics Tool: ScrapPy

Digital Forensics Tool: ScrapPy

ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets.

read more