Te-k / harpoontoolsLinks
CLI tools using Harpoon features
☆21Updated last year
Alternatives and similar repositories for harpoontools
Users that are interested in harpoontools are comparing it to the libraries listed below
Sorting:
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- ☆33Updated 4 months ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 4 months ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- ☆24Updated last year
- recon-ng modules for Censys☆37Updated last year
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Create visualization from Shodan query☆73Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- A static website template for security pages.☆51Updated 9 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Simple scripts aiding penetration testing process☆14Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Shodan Port Scanner☆43Updated 4 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Subdomain Enumeration and Scanner☆33Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 7 months ago
- ☆21Updated 2 years ago