Bugs-B0unt3r / google-sheets-hunting-bad-domainsLinks
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆13Updated 8 months ago
Alternatives and similar repositories for google-sheets-hunting-bad-domains
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆38Updated this week
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- ☆32Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆20Updated 6 months ago
- Powershell Scripts for Blue Team members☆12Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- ☆28Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- ☆77Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆20Updated 2 years ago
- ☆17Updated 2 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki …☆35Updated 2 months ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated 2 months ago