TheHairyJ / ScoutLinks
Scout - a Contactless Active Reconnaissance Tool
☆53Updated 2 years ago
Alternatives and similar repositories for Scout
Users that are interested in Scout are comparing it to the libraries listed below
Sorting:
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- GreyNoise Query Language☆82Updated 6 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆50Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 9 years ago
- API testing tool written with Python☆56Updated 8 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 7 months ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 9 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago