Tools for intelligence-gathering.
25 listed tools Last update on 2025-06-12
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Commercial Free
Web technology platform that identifies the tech stack of websites, aiding in reconnaissance and infrastructure analysis
Open-source
Reveal the specific modules, plugins, components, and themes run by CMS websites + associated vulnerabilities
Open-source
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery
Free
Service to check if your email or phone number has been compromised in a data breach
Commercial
OSINT search engine and data archive for email, domain, IP, Bitcoin address, and more