ctrlsam / rigourLinks
A rigorous IoT scanner based on Shodan.io
☆56Updated 5 months ago
Alternatives and similar repositories for rigour
Users that are interested in rigour are comparing it to the libraries listed below
Sorting:
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.☆1Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆36Updated 2 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆45Updated this week
- ☆41Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆50Updated last week
- masscan with exclusive excludes☆57Updated last year
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆73Updated 11 months ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆39Updated 11 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆107Updated this week
- Open Source External Attack Surface Management☆48Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆123Updated 3 weeks ago
- self-hosted Azure OSINT tool☆30Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆74Updated last month
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 10 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆13Updated 9 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 7 months ago
- CLI tool for interacting with GPT, analyze local files, etc.☆16Updated last month
- Honeypot Service Simulator☆23Updated 9 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆29Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated last week
- XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of…☆18Updated 2 months ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- A simple vulnerability scanning application built with FastAPI. vulnerability-scanner open-source-security nmap-cve SIEM☆23Updated 3 weeks ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆74Updated last month