aravind0x7 / Moxie
Moxie scans & tests MQTT services. Secure your IoT infrastructure!
☆20Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Moxie
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆85Updated 7 months ago
- ☆55Updated 6 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆109Updated 10 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆84Updated 9 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆51Updated this week
- ☆62Updated last year
- This is an AD pentest tools collection☆53Updated 4 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- Discovering Typo Squatting on your domains!☆60Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Pentest/Red Team: Resources, repos and scripts.☆60Updated this week
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Mind Maps for penetration testing☆17Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆124Updated 4 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆120Updated last year
- ☆45Updated last month
- Jupyter Notebooks for the Blue Team☆33Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- Discover and track internet assets using favicon hashes through search engines.☆121Updated last month
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆24Updated 5 months ago
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- ☆12Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆182Updated 2 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago
- ☆34Updated 8 months ago
- Tor onion address lookup☆32Updated last month