NS-unina / OSINT-Collector
☆12Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for OSINT-Collector
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 5 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated this week
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆17Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated last year
- Perform OSINT on external targets using Shodan☆21Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆11Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Collection of offensive tools targeting Microsoft Azure☆10Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Burp suite Certificate modification tool☆17Updated last year
- ☆12Updated 3 years ago
- Python script to tamper with pages to test for Log4J Shell vulnerability.☆13Updated 2 weeks ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago