ctrlsam / rigourLinks
A rigorous IoT scanner based on Shodan.io
☆86Updated last month
Alternatives and similar repositories for rigour
Users that are interested in rigour are comparing it to the libraries listed below
Sorting:
- Moxy is an open-source DAST tool designed for modern web application security testing. It provides an easy-to-use interface with agentic …☆73Updated 2 weeks ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆64Updated 5 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- Explore a website's internal links, then visualize and interact with those connections as a network graph with scorecards and analysis us…☆87Updated last month
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- COMPLETE OSINT CHEAT-SHEET☆120Updated 3 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆60Updated last year
- Drill into WARC web archives☆141Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆190Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Gather information from an email address connected to Office 365☆89Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Updated 4 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆82Updated 5 months ago
- Signature based honeypot detector tool written in Golang☆108Updated 10 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆172Updated 2 weeks ago
- ☆56Updated last year
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆166Updated last month
- Daily updates from leaked data search engines, aggregators and similar services.☆146Updated this week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆338Updated last week
- Honeypot Service Simulator☆22Updated last year
- TakedownGPT combines a LangChain Agent with OpenAI function calling to automate the discovery of domain registrars and drafting of takedo…☆48Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 months ago
- Windows forensics Engine☆54Updated 2 weeks ago
- Protection against HTML smuggling attacks.☆101Updated 6 months ago