Te-k / harpoontools
CLI tools using Harpoon features
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for harpoontools
- Convert Wigle.net result from json to Kml☆15Updated 3 years ago
- ☆34Updated 6 years ago
- Useful commands for infosec☆28Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- recon-ng modules for Censys☆36Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆54Updated this week
- OSINT tool to evaluate the trustworthiness of a company☆41Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Admin for☆15Updated 6 years ago
- Scripts related to offensiveosint.io☆20Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- ☆24Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- ☆21Updated last year
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- CVE-2020-5902☆9Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 7 months ago
- personal fork of OSINT tool recon-ng☆16Updated 6 years ago
- GreyNoise Maltego integration and transforms☆20Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago