Te-k / harpoonLinks
CLI tool for open source and threat intelligence
☆1,225Updated 4 months ago
Alternatives and similar repositories for harpoon
Users that are interested in harpoon are comparing it to the libraries listed below
Sorting:
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,333Updated this week
- Your Everyday Threat Intelligence☆1,879Updated this week
- Extract and aggregate threat intelligence.☆872Updated last year
- Machinae Security Intelligence Collector☆526Updated last year
- Scanning pastebin with yara rules☆1,093Updated 3 weeks ago
- A query aggregator for OSINT based threat hunting☆901Updated this week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,288Updated 5 months ago
- Phishing catcher using Certstream☆1,757Updated 10 months ago
- A browser extension for OSINT search☆1,626Updated last week
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,063Updated this week
- Links for the OSINT Team☆600Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆547Updated 2 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,371Updated last year
- A collection of sources of indicators of compromise.☆879Updated 2 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,018Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,124Updated 6 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆934Updated last week
- FAME Automates Malware Evaluation☆904Updated 2 months ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,320Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆673Updated last year
- A collective list of public APIs for use in security. Contributions welcome☆929Updated 2 months ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946Updated 4 years ago
- Online hash checker for Virustotal and other services☆831Updated 3 months ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆648Updated 3 years ago
- Create actionable data from your Vulnerability Scans☆1,386Updated 2 years ago
- A collection of resources for Threat Hunters☆892Updated 8 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Updated last year
- Don't Just Search OSINT. Sweep It.☆316Updated 4 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆483Updated 4 years ago
- OSINT Swiss Army Knife☆648Updated 4 years ago