RedSiege / Just-Metadata
Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within a large dataset.
☆624Updated 8 months ago
Alternatives and similar repositories for Just-Metadata:
Users that are interested in Just-Metadata are comparing it to the libraries listed below
- (extensible) Data Exfiltration Toolkit (DET)☆825Updated 7 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- Automater - IP URL and MD5 OSINT Analysis☆539Updated 7 months ago
- Malicious HTTP traffic explorer☆717Updated last year
- Machinae Security Intelligence Collector☆507Updated 9 months ago
- Malcom - Malware Communications Analyzer☆1,158Updated 7 years ago
- A low to medium interaction honeypot.☆466Updated 11 months ago
- A fully featured backdoor that uses Twitter as a C&C server☆772Updated 4 years ago
- Incident Response Forensic Framework☆599Updated 5 years ago
- ☆512Updated last year
- ☆425Updated 7 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 7 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆986Updated 7 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆330Updated 4 years ago
- ☆603Updated 5 months ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- Email recon made fast and easy, with a framework to build on☆952Updated 2 years ago
- Scans for accessibility tools backdoors via RDP☆336Updated 6 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Updated 2 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,008Updated 4 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆836Updated last month
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated 2 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,319Updated last week
- Automated network asset, email, and social media profile discovery and cataloguing.☆638Updated 3 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆551Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- ☆507Updated 4 years ago