Operation Falcon (@Operation-Falcon)
  • Stars
    star
    20
  • Global Org. Rank 118,719 (Top 38 %)
  • Registered over 3 years ago
  • Most used languages
    Python
    60.0 %
    HTML
    20.0 %
    Go
    20.0 %
  • Location 🇮🇳 India
  • Country Total Rank 26,884
  • Country Ranking
    Go
    1,472
    Python
    6,872
    HTML
    9,121

Top repositories

1

Attacksurfacemanagement

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
4
star
2

pawned_and_owned

Pawned and owned framework is a web application based on sharing data dump from different sources such as pastebin, sharing sites and dark web dump so that the organization can be alerted of compromised information found in those breaches.
HTML
3
star
3

AttackSurfaceManagement

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
3
star
4

axtrack

Axtrack extract all possible urls for a given domain from archive.
Go
2
star
5

sikert

Sikert is an subdomain enumeration tool which uses different sources to perform enumeration.
Go
2
star
6

pawny

Pawny is a data breach cli tool used to detect breaches related to email address and domain name.
Python
2
star
7

AttackSurfaceManagement-DOCS

Attack surface management is an attacker perspective about how the attacker may see the organizational assets to be vulnerable and to be exploited by the attacker.
Python
1
star
8

hunter

Hunter is wrapper for hunter.io based on community version written in python, aimed to help security researcher build their integrations with hunter.io.
Python
1
star
9

sectrails

Sectrails is wrapper for security trails based on community version written in python, aimed to help security researcher build their integrations with security trails.
Python
1
star
10

eframe

Eframe : Eframe is a web application built for the purpose of providing the organization better understanding of their assets such as email address and their presence on various platform and what possible attack vector can be developed against the victims.
HTML
1
star