Crawlector is a threat hunting framework designed for scanning websites for malicious objects.
☆124Dec 13, 2025Updated 2 months ago
Alternatives and similar repositories for Crawlector
Users that are interested in Crawlector are comparing it to the libraries listed below
Sorting:
- ☆27Aug 18, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Sep 7, 2023Updated 2 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆356Dec 14, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Nov 3, 2021Updated 4 years ago
- EndExt is a .go tool for extracting all the possible endpoints from the JS files☆219Jul 14, 2024Updated last year
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Aug 20, 2025Updated 6 months ago
- ☆120Mar 28, 2025Updated 11 months ago
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Feb 24, 2026Updated last week
- Secrets scanner that understands code☆192Nov 2, 2023Updated 2 years ago
- A dynamic unpacking tool☆147Sep 17, 2023Updated 2 years ago
- Discover hidden debugging parameters and uncover web application secrets☆247Feb 4, 2026Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Default Detections for EDR☆97Feb 20, 2024Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆46Mar 15, 2024Updated last year
- Small tool to play with IOCs caused by Imageload events☆44May 14, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆816Feb 17, 2025Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago