Bugs-B0unt3r / google-sheets-hunting-bad-domains
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆12Updated 4 months ago
Alternatives and similar repositories for google-sheets-hunting-bad-domains:
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 6 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Powershell Scripts for Blue Team members☆12Updated last year
- Check for the existence of an email on Google platforms☆12Updated 10 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- ☆32Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆51Updated 9 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆15Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- Fast Path Traversal exploitation tool☆21Updated 9 months ago
- Terminal based fake identity generator.☆26Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 5 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- A network logging tool that logs per process activities☆32Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 11 months ago
- Top 400 passwords as per HaveIBeenPwned☆21Updated 3 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆35Updated last month
- ☆17Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrap…☆46Updated 2 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- ☆27Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 8 months ago
- The first and only (for now) Bulgarian OSINT tools list.☆19Updated 10 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆37Updated last month
- A user enumeration tool for Slack.☆24Updated 7 months ago