Lookyloo / lookyloo
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
☆711Updated last week
Alternatives and similar repositories for lookyloo
Users that are interested in lookyloo are comparing it to the libraries listed below
Sorting:
- A query aggregator for OSINT based threat hunting☆892Updated this week
- Python library for connecting to CertStream☆445Updated 9 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,327Updated last week
- Yet Another Yara Automaton - Automatically curate open source yara rules and run scans☆280Updated last year
- CLI tool for open source and threat intelligence☆1,206Updated 2 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,036Updated this week
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,303Updated 2 years ago
- Extract and Visualize Data from URLs using Unfurl☆669Updated last week
- Extract and aggregate threat intelligence.☆863Updated last year
- Online hash checker for Virustotal and other services☆825Updated last month
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- Learning Shodan through katas☆466Updated 4 years ago
- Open Source Intelligence Browser Extension☆366Updated 9 months ago
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆376Updated 6 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆311Updated last month
- Digital Forensics Investigation Platform☆819Updated 7 months ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆668Updated last year
- Real-time, container-based file scanning at enterprise scale☆919Updated 3 weeks ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆350Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,122Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,012Updated 4 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆680Updated 4 years ago
- CyLR - Live Response Collection Tool☆677Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated last week
- Your Everyday Threat Intelligence☆1,847Updated last week
- Create actionable data from your Vulnerability Scans☆1,379Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆634Updated last year