PaulSec / Shodan-mattermostView external linksLinks
Mattermost - Shodan Slash command
☆31Jan 25, 2017Updated 9 years ago
Alternatives and similar repositories for Shodan-mattermost
Users that are interested in Shodan-mattermost are comparing it to the libraries listed below
Sorting:
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Unicode Security Toolkit☆21Feb 8, 2026Updated last week
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Jan 10, 2026Updated last month
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Apr 17, 2021Updated 4 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Container for assorted volatility plugins.☆23Oct 22, 2013Updated 12 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 2 months ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Exported from https://code.google.com/archive/p/hookme/☆44Nov 24, 2016Updated 9 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated last year
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Pretty awesome command-line client for public SSLLabs API☆20Feb 2, 2026Updated 2 weeks ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆48Jan 1, 2017Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 2 months ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Random source codes☆26Dec 22, 2025Updated last month
- Visualisation of ulogd / ufw / iptables data☆39Dec 3, 2014Updated 11 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- ☆68Aug 16, 2021Updated 4 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago