anandtiwarics / datasploit
A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
☆30Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for datasploit
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 3 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 5 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Simple DDE object detector☆55Updated 6 years ago
- WhiteBox CMS analysis☆68Updated last year
- Splunk Web Shell☆50Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated last year
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 6 months ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 5 years ago
- Some simple and useful tools☆15Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago