A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
☆31Apr 22, 2018Updated 7 years ago
Alternatives and similar repositories for datasploit
Users that are interested in datasploit are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆23Jun 29, 2025Updated 8 months ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- ☆14May 17, 2018Updated 7 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Yet another IDA Pro real time syncing plugin☆16Mar 27, 2018Updated 7 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ☆63Jan 15, 2016Updated 10 years ago
- ☆11May 19, 2017Updated 8 years ago
- DockerFiles for Docker Containers☆16Sep 2, 2017Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago