Bugs-B0unt3r / google-sheets-hunting-bad-domains
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆12Updated 7 months ago
Alternatives and similar repositories for google-sheets-hunting-bad-domains:
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
- Check for the existence of an email on Google platforms☆14Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆25Updated 8 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 11 months ago
- The first and only (for now) Bulgarian OSINT tools list.☆19Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- ☆32Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 6 months ago
- A network logging tool that logs per process activities☆32Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆43Updated 2 weeks ago
- Terminal based fake identity generator.☆26Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 3 weeks ago
- Enumeration & fingerprint tool☆24Updated last year
- ☆17Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated last year
- Subdomains scanner Spider☆13Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 8 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆30Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month