Bugs-B0unt3r / google-sheets-hunting-bad-domains
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆10Updated 2 weeks ago
Related projects: ⓘ
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 2 months ago
- Check for the existence of an email on Google platforms☆12Updated 5 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆28Updated 4 months ago
- Powershell Scripts for Blue Team members☆12Updated 9 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 10 months ago
- ☆28Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆13Updated 4 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 5 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated 6 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆11Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆19Updated 7 months ago
- aiohttp LFI (CVE-2024-23334)☆22Updated 6 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago
- this nuclei template finds back up files☆16Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆27Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆77Updated 5 months ago
- ☆29Updated last year
- Capture screenshots of onion services on an onion service.☆50Updated 3 months ago
- A network logging tool that logs per process activities☆32Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- ☆11Updated last month
- Subdomains scanner Spider☆13Updated 6 months ago
- ☆14Updated this week