7Ragnarok7 / DEDMAPLinks
A Network Automation framework focused on Cyber-Security
☆46Updated 2 years ago
Alternatives and similar repositories for DEDMAP
Users that are interested in DEDMAP are comparing it to the libraries listed below
Sorting:
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 months ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated 3 months ago
- ☆10Updated 3 years ago
- Yet another OSINT automator.☆18Updated 5 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆55Updated 3 weeks ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆17Updated 3 years ago
- A tool designed to analyse email headers☆39Updated 3 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆33Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- In this repository, I will collect quick and simple code examples that use Python to automate various #osint tasks.☆57Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆46Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Quidam maltego transform☆42Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Updated 3 years ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Nqntnqnqmb transform maltego☆24Updated 5 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated 3 weeks ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 4 years ago
- Wordlist creator written in C to generate all possibilities of passwords☆22Updated 7 years ago
- Fraud prevention tool☆28Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago