MFMokbel / Crawlector
Crawlector is a threat hunting framework designed for scanning websites for malicious objects.
☆126Updated last year
Alternatives and similar repositories for Crawlector:
Users that are interested in Crawlector are comparing it to the libraries listed below
- Hijack a slack bot to phish your way in☆54Updated 2 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆119Updated 2 years ago
- ☆52Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 7 months ago
- Canary Detection☆164Updated 11 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated 10 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated last year
- Modular web-application honeypot platform built using go and gin☆56Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 8 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 5 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆88Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 5 months ago
- A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representati…☆85Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated last month
- Living Off Security Tools☆45Updated 4 months ago
- Easy red team phishing with Puppeteer☆128Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last week
- C2 Automation using Linode☆80Updated 2 years ago
- https://lolad-project.github.io/☆72Updated 2 months ago
- ☆77Updated 11 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated 11 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 4 months ago
- All kinds of tiny shells☆58Updated 2 years ago