Search Results for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

Showing 52 open source projects for "/storage/emulated/0/android/data/net.sourceforge.uiq3.fx603p/files"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 1
    X-osint

    X-osint

    Open source OSINT tool for gathering data on emails, phones, and IPs

    ...In addition to network and domain intelligence, it includes features for extracting metadata from files or images and analyzing text content to uncover hidden details. X-osint is written primarily in Python and is designed to run in terminal environments, particularly on Linux systems and Termux setups.
    Downloads: 47 This Week
    Last Update:
    See Project
  • 2
    reNgine

    reNgine

    Automated framework for web application reconnaissance and scanning

    ...The platform integrates multiple open-source reconnaissance tools into a unified environment with a configurable scanning engine and an intuitive web interface. reNgine focuses on improving traditional reconnaissance workflows by organizing collected data in a database and correlating results to make them easier to analyze. This approach helps security professionals avoid manually searching through scattered files and instead work with structured, searchable reconnaissance data. The framework supports continuous monitoring of targets and can automatically notify users about newly discovered assets or vulnerabilities.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Xteam

    Xteam

    All-in-one command-line toolkit for security testing and OSINT tools

    ...It acts as a centralized launcher that integrates scripts and third-party tools, allowing users to access different testing functions through a menu-based command line workflow. Xteam includes features such as Instagram information gathering, phishing utilities, wireless attack tools, and Android security testing capabilities. Xteam’s architecture uses a main bash script that serves as the hub for running internal modules or downloading and executing external projects when needed. It can operate on Linux systems as well as Android devices using Termux, making it accessible in both desktop and mobile environments.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Flowsint

    Flowsint

    Graph-based OSINT investigation platform w visual relationship mapping

    ...The platform focuses on reconnaissance and open source intelligence workflows, enabling investigators to map connections between domains, IP addresses, organizations, individuals, and other data points. By presenting these relationships in an interactive graph, Flowsint allows users to quickly identify patterns, associations, and investigative leads that might be difficult to detect through traditional data analysis methods. The system includes automated enrichers that gather additional intelligence about entities such as domain records, social media profiles, network infrastructure, and cryptocurrency activity. ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 5
    Instagram OSINT Tool

    Instagram OSINT Tool

    Instagram OSINT tool for gathering profile data and public posts

    ...The results are saved locally in structured formats such as JSON-style data inside text files, making them easy to analyze or integrate into other applications. InstagramOSINT also exposes a Python API so developers can import the functionality.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 6
    IntelOwl

    IntelOwl

    Centralized platform for automated threat intelligence analysis

    IntelOwl is an open source platform designed to manage and enrich threat intelligence data at scale. It provides a centralized environment where security analysts can gather information about suspicious files and observables such as IP addresses, domains, URLs, or hashes using a single API request. The platform integrates numerous online intelligence sources and advanced malware analysis tools, enabling users to obtain comprehensive threat intelligence without manually querying multiple services. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    IPRanges

    IPRanges

    Daily updated lists of cloud, bot, and service IP ranges

    ...Lists are published in both IPv4 and IPv6 formats and are regularly updated through automated processes to keep the data current. In addition to provider specific lists, the project also offers merged and combined datasets that aggregate ranges from multiple sources into a single file.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Instaloader

    Instaloader

    Download pictures (or videos) along with their captions

    ...It includes smart update mechanisms that resume interrupted downloads and fetch only new media to maintain efficient archives. The project is widely adopted by investigators and analysts who need structured Instagram data collection. In essence, Instaloader provides a robust and highly configurable pipeline for Instagram content retrieval.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    geowifi

    geowifi

    OSINT tool for locating WiFi networks using BSSID or SSID data

    ...It queries several public WiFi geolocation databases and aggregates the results to help identify the approximate location of a wireless access point. By combining multiple data sources such as Wigle, Apple, Google, WifiDB, Mylnikov, and Combain, the tool can provide location data that may include coordinates and additional network metadata. Users can run searches through a command-line interface by specifying either the BSSID (MAC address) or the SSID of a network. The results can be displayed in different formats, including a structured JSON output or an interactive HTML map showing the discovered locations. geowifi also supports API-based integrations with certain services, which allows geowifi to retrieve more accurate or detailed geolocation data when valid API credentials are configured.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Simplify Your Managed File Transfers with JSCAPE Icon
    Simplify Your Managed File Transfers with JSCAPE

    JSCAPE is a Flexible, Scalable MFT Solution That Supports Any Protocol, Any Platform, Any Deployment

    Platform Independent Managed File Transfer Server. JSCAPE is the perfect solution for businesses and government agencies looking to centralize your processes and provide secure, seamless and reliable file transfers. Meet all compliance regulations including PCI DSS, SOX, HIPAA and GLBA.
    Learn More
  • 10
    theHarvester

    theHarvester

    E-mails, subdomains and names

    ...Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 44 This Week
    Last Update:
    See Project
  • 11
    Toutatis

    Toutatis

    Extract public Instagram account information from usernames

    ...Toutatis is commonly used in open source intelligence investigations, research tasks, and security analysis that involve collecting publicly available social media data.
    Downloads: 26 This Week
    Last Update:
    See Project
  • 12
    OWASP Maryam

    OWASP Maryam

    Modular OSINT framework for automated open-source intelligence gatheri

    Maryam is an open source intelligence (OSINT) framework designed to automate the process of gathering and analyzing publicly available information from the internet. It provides a modular environment that enables users to collect data from search engines, open data sources, and various online services for reconnaissance and investigative purposes. Written in Python, Maryam is built to provide a flexible and extensible framework for harvesting information quickly and efficiently from open sources. Maryam helps security researchers and analysts streamline routine data-gathering tasks that typically involve searching multiple sources such as Google, Bing, or other online platforms. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    WhatBreach is an open source OSINT (Open Source Intelligence) tool designed to help users discover whether an email address has appeared in known data breaches. It simplifies the process of investigating compromised credentials by allowing users to search for a single email address or analyze multiple email addresses at once. It gathers breach information from various sources and APIs to identify where the email has been exposed in leaked databases or online paste sites. Once breaches are discovered, WhatBreach can provide additional context such as the databases associated with those leaks and any related paste dumps containing the email address. ...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 14
    gitGraber

    gitGraber

    Real-time GitHub monitor that detects leaked API keys and secrets

    gitGraber is a Python-based security tool designed to monitor GitHub in real time to detect exposed sensitive information in publicly indexed repositories. It scans recently indexed files on GitHub and searches for patterns that may indicate leaked credentials, API keys, or other confidential data used by popular online services. Instead of analyzing the full history of repositories, the tool focuses on newly indexed content, allowing security researchers and bug bounty hunters to quickly identify fresh leaks as they appear. gitGraber uses carefully crafted regular expressions to detect tokens and secrets associated with platforms such as AWS, Google, PayPal, Twitter, Stripe, and many others. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    WhatsApp Beacon

    WhatsApp Beacon

    OSINT tool for tracking WhatsApp online status via Web automation

    ...The collected information is stored in logs and a local database, allowing users to review behavioral patterns over time. In addition, the project supports exporting collected data to spreadsheet formats for further analysis or reporting. WhatsApp Beacon is designed to run across multiple operating systems and can operate in the background using headless browser automation. It is intended for educational and research purposes related to open-source intelligence (OSINT) and digital investigation.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 16
    Robin

    Robin

    AI-powered tool for dark web OSINT search and investigation

    ...By integrating AI models, the platform can interpret results, highlight key information, and produce summaries that help analysts understand findings faster. The project provides a modular architecture separating search, scraping, and AI processing components so it can be extended with new data sources.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 17
    ClatScope

    ClatScope

    OSINT reconnaissance tool for IP, domain, email, and username lookups

    ...It is primarily aimed at investigators, cybersecurity professionals, penetration testers, and researchers who need a centralized platform for reconnaissance tasks. It integrates with numerous public APIs and internet services to retrieve detailed data about IP addresses, domains, email addresses, phone numbers, usernames, and other digital identifiers. By combining these sources, ClatScope automates the process of collecting intelligence that would normally require multiple separate tools or manual searches. It operates through a menu-driven command line interface that allows users to choose from many reconnaissance functions and receive formatted results directly in the terminal. ...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 18
    Harpoon

    Harpoon

    Command line OSINT and threat intelligence automation tool

    ...This design allows users to automate many reconnaissance and intelligence gathering tasks directly from the terminal. Harpoon integrates with numerous security and data services such as Shodan, VirusTotal, AlienVault OTX, and many other intelligence providers to retrieve information about domains, IP addresses, emails, and other indicators. Many commands rely on API keys that can be configured through a central configuration file, allowing users to connect their own intelligence accounts and data sources.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    pwnedOrNot

    pwnedOrNot

    Check breached emails and find exposed passwords from public dumps

    pwnedOrNot is an open source OSINT tool designed to investigate whether an email address has been compromised in known data breaches and to identify exposed credentials associated with that account. The tool works by interacting with the HaveIBeenPwned (HIBP) API to determine if a given email address appears in breach databases. If the email is found in a breach, the tool proceeds to search for associated passwords within publicly available data dumps.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    Blackbird

    Blackbird

    OSINT tool for finding accounts across 600+ sites by username or email

    ...The project focuses on helping investigators, researchers, and security professionals quickly discover where a specific identity appears on the internet. It performs reverse searches across more than 600 websites by leveraging data from the community-driven WhatsMyName project, which improves detection accuracy and reduces false positives. The tool operates primarily through a command line interface, allowing users to run automated searches and gather results from many platforms in a single process. Blackbird also includes an optional AI-powered profiling feature that analyzes discovered sites to generate behavioral and technical insights about a user’s online presence. ...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 21
    SiteDorks

    SiteDorks

    Automate search engine dorking across hundreds of websites

    ...A built-in dataset contains hundreds of websites grouped into categories such as cloud services, developer platforms, documentation sites, social platforms, and communication tools. Users can also supply custom domain lists or CSV files to tailor searches for tasks like penetration testing, bug bounty research, or OSINT investigations.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    Tookie-OSINT

    Tookie-OSINT

    Username OSINT tool for discovering accounts across many websites

    Tookie-OSINT is an open source intelligence tool designed to help security researchers, ethical hackers, and investigators discover online accounts associated with a specific username. It automates the process of searching for usernames across multiple websites, making it easier to identify a person's presence on different platforms. By entering a target username, Tookie-OSINT scans a list of supported sites and checks whether the username exists on those platforms. This approach removes the...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 23
    IVRE

    IVRE

    Open source framework for large scale network reconnaissance and analy

    IVRE is an open source network reconnaissance framework designed to collect, process, and analyze intelligence gathered from network scans and traffic data. It provides tools for both active and passive reconnaissance, enabling users to understand how networks behave and identify exposed services or infrastructure. The framework integrates with well known security and scanning tools such as Nmap, Masscan, ZGrab2, ZDNS, and Zeek to gather large amounts of network intelligence. IVRE stores the collected data in a database and offers multiple ways to explore and analyze it, including a web interface, command line tools, and a Python API. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    RedAmon

    RedAmon

    AI-powered framework for automated penetration testing and red teaming

    ...It begins with a multi-phase reconnaissance engine that maps the entire attack surface of a target, collecting information such as subdomains, open ports, services, and potential vulnerabilities. RedAmon then uses an AI agent orchestrator to analyze this data, select appropriate tools, and perform exploitation steps such as credential brute forcing or CVE-based attacks. All discovered assets, relationships, and vulnerabilities are stored in a Neo4j knowledge graph, allowing the system to reason about the environment and make informed decisions during the attack process.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 25
    secator

    secator

    Automated framework for running pentesting tools and workflows

    Secator is a task and workflow runner designed to streamline security assessments by integrating many well-known penetration testing and reconnaissance tools into a unified framework. It acts as a centralized automation platform that helps security professionals run tasks, workflows, and scans more efficiently from a single command-line interface. It supports dozens of established security tools and organizes them into structured workflows, enabling users to perform complex reconnaissance...
    Downloads: 11 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB