Darksearch / Torfka
Scrape real-time Dark Web data across Tor to your local kafka network
☆14Updated 8 years ago
Alternatives and similar repositories for Torfka:
Users that are interested in Torfka are comparing it to the libraries listed below
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- HoneyDB Python Module☆13Updated 11 months ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Python wrapper for the Mitre ATT&CK framework API☆26Updated 6 years ago
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ☆11Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- intrusion detection☆23Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- (Unofficial) Python API for http://namechk.com☆19Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 8 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 8 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Crawl certificate information from censys☆8Updated 8 years ago