Te-k / pycrtsh
Python 3 library to request https://crt.sh/
☆31Updated 2 months ago
Alternatives and similar repositories for pycrtsh:
Users that are interested in pycrtsh are comparing it to the libraries listed below
- ☆24Updated last year
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Updated 2 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 9 months ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- python wrapper to use tshark for file extraction from the command line.☆27Updated 6 years ago
- A rogue DNS detector☆23Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆41Updated 10 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Static Token And Credential Scanner☆95Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- A CLI tool for querying passive DNS services☆41Updated last year
- ☆18Updated 5 years ago
- ☆30Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Passive Security Tools Fingerprinting Framework☆72Updated 3 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆35Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- ☆19Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 4 years ago
- Bro integration with osquery☆15Updated last year
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆20Updated 6 months ago