Te-k / harpoontools
CLI tools using Harpoon features
☆21Updated last year
Alternatives and similar repositories for harpoontools:
Users that are interested in harpoontools are comparing it to the libraries listed below
- recon-ng modules for Censys☆36Updated last year
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ☆34Updated 3 weeks ago
- Useful commands for infosec☆29Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- ☆24Updated last year
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Custom Maltego transforms☆64Updated 9 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- A collection of personal ZAP scripts☆14Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 3 weeks ago
- ☆21Updated last year
- Lootbox downloads open directories shared on Twitter.☆36Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- Maltego integration of https://clearbit.com☆37Updated 4 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Admin for☆15Updated 6 years ago
- Hashes of infamous malware☆25Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 months ago
- Nmap Web Dashboard and Reporting☆34Updated 2 years ago