Bugs-B0unt3r / google-sheets-hunting-bad-domainsLinks
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆14Updated last year
Alternatives and similar repositories for google-sheets-hunting-bad-domains
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Powershell Scripts for Blue Team members☆11Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- The first and only (for now) Bulgarian OSINT tools list.☆22Updated last year
- ☆78Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆48Updated 2 months ago
- Check for the existence of an email on Google platforms☆19Updated last year
- Terminal based fake identity generator.☆25Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Updated 8 months ago
- ☆19Updated 4 months ago
- ☆31Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated last month
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 7 months ago
- Tor onion address lookup☆55Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆45Updated 10 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆49Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- OSINT tool for username, email and domains☆30Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆14Updated last year
- ☆27Updated 2 years ago