NullArray / MimirLinks
OSINT Threat Intel Interface - CLI for HoneyDB
☆118Updated 6 years ago
Alternatives and similar repositories for Mimir
Users that are interested in Mimir are comparing it to the libraries listed below
Sorting:
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 4 months ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- tools for analyzing strings from password lists☆59Updated 2 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆66Updated 7 years ago
- Leak File Analyzer☆62Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Canari v3 - next gen Maltego framework for rapid remote and local transform development☆144Updated 4 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- scripts for pentesting☆88Updated 6 years ago
- osint_tools_security_auditing☆155Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 4 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Passive Vulnerability Auditor☆133Updated 9 years ago
- PowerShell script to retreive wifi ESSIDs and Passwords.☆26Updated 8 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- myBFF - a Brute Force Framework☆140Updated 4 months ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago