Bugs-B0unt3r / google-sheets-hunting-bad-domainsLinks
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆14Updated 10 months ago
Alternatives and similar repositories for google-sheets-hunting-bad-domains
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Collection of videos of Raids on Cybercriminals☆20Updated 3 months ago
- Powershell Scripts for Blue Team members☆11Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 3 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated last month
- ☆32Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated 3 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆14Updated 6 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 8 months ago
- ☆28Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆14Updated 5 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Terminal based fake identity generator.☆26Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated last month
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆13Updated last year
- Ransomware groups posts☆39Updated this week