KaanSK / shomonLinks
Shodan Monitoring integration for TheHive.
☆130Updated 5 months ago
Alternatives and similar repositories for shomon
Users that are interested in shomon are comparing it to the libraries listed below
Sorting:
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Tool to discover external and internal network attack surface☆198Updated last year
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago
- URL fingerprinting made easy☆86Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- nse script to inject jndi payloads☆46Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆119Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆63Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- ☆12Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 10 months ago
- Azure AD enumeration over MS Graph☆81Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- ☆22Updated 4 years ago
- ☆80Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆18Updated 7 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- A WLAN red team framework.☆154Updated 7 months ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago