Bugs-B0unt3r / google-sheets-hunting-bad-domainsLinks
This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from Google Sheets. By leveraging various APIs, these scripts can retrieve information such as VirusTotal reports, WHOIS data, breach information from Have I Been Pwned, and the HTTP status of a domain.
☆14Updated 9 months ago
Alternatives and similar repositories for google-sheets-hunting-bad-domains
Users that are interested in google-sheets-hunting-bad-domains are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Terminal based fake identity generator.☆26Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆45Updated 3 weeks ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆32Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Tool for scanning domains for .git directories.☆16Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆14Updated 5 months ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆35Updated last week
- ☆28Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 3 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆52Updated 2 weeks ago
- ☆17Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year