ctrlsam / rigour
A rigorous IoT scanner based on Shodan.io
☆50Updated 3 months ago
Alternatives and similar repositories for rigour:
Users that are interested in rigour are comparing it to the libraries listed below
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆43Updated 3 weeks ago
- Open Source External Attack Surface Management☆49Updated last year
- Use Python to explore a website's internal links. Then apply D3 to visualize those connections as an interactive network graph with score…☆83Updated last week
- 🪟 Windows ➡️ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during u…☆30Updated 2 weeks ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 9 months ago
- Fork of SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆44Updated this week
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 4 months ago
- COMPLETE OSINT CHEAT-SHEET☆86Updated 3 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆36Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆31Updated 2 weeks ago
- Repository for write-ups of Sofia Santos' OSINT exercises☆15Updated 3 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 4 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆33Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- DPULSE - Tool for complex approach to domain OSINT☆114Updated this week
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆39Updated 9 months ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆33Updated 8 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated 10 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Visualize BBOT scans in realtime with VivaGraphJS☆46Updated 6 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- All-sources tool to search websites by favicons☆123Updated 6 months ago
- masscan with exclusive excludes☆56Updated last year
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆27Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆13Updated 7 months ago