Tagged articles
5 articles
Page 1 of 1
AI Explorer
AI Explorer
May 1, 2026 · Information Security

Maigret: A 3000+ Site Username Reconnaissance Tool for OSINT

Maigret is an open‑source Python utility that, with a single username, scans over 3,000 websites to automatically collect public profiles, images, locations and linked accounts, offering a fast, extensible way for OSINT practitioners to build comprehensive digital footprints while emphasizing legal and ethical use.

MaigretOSINTPython
0 likes · 6 min read
Maigret: A 3000+ Site Username Reconnaissance Tool for OSINT
Black & White Path
Black & White Path
Mar 28, 2026 · Information Security

Network Security Red Book: 700+ Tools from Recon to Internal Penetration

This article compiles over 700 high‑quality open‑source security projects from GitHub, categorised by functional scenarios such as automated reconnaissance, information gathering, vulnerability exploitation, internal network penetration, evasion, and incident response, providing a comprehensive practical toolkit for red‑team, blue‑team and security researchers.

network securityopen‑sourcepenetration testing
0 likes · 18 min read
Network Security Red Book: 700+ Tools from Recon to Internal Penetration
Open Source Linux
Open Source Linux
Sep 21, 2022 · Information Security

WebCrack: Automated Bulk Weak‑Password Detection for Web Back‑Ends

WebCrack is an open‑source tool that automates the discovery of weak or universal passwords across a wide range of web‑based CMS back‑ends by automatically identifying login parameters, evaluating login success, applying dynamic dictionaries, and supporting custom rule files, all while handling diverse response patterns and WAF interference.

CMS detectionInformation SecurityWeb Automation
0 likes · 13 min read
WebCrack: Automated Bulk Weak‑Password Detection for Web Back‑Ends
Liangxu Linux
Liangxu Linux
Jul 21, 2021 · Information Security

Master Google Hacking: Essential Search Operators for Security Recon

Learn how to leverage Google Hacking techniques—using operators like site, filetype, inurl, intitle, and intext—to efficiently gather security-relevant information, with practical examples and a link to the Google Hacking Database for further reconnaissance.

Google HackingInformation GatheringSearch Operators
0 likes · 6 min read
Master Google Hacking: Essential Search Operators for Security Recon