ctrlsam / rigourLinks
A rigorous IoT scanner based on Shodan.io
☆58Updated 6 months ago
Alternatives and similar repositories for rigour
Users that are interested in rigour are comparing it to the libraries listed below
Sorting:
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.☆1Updated last month
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆45Updated 3 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 11 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆50Updated 8 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆36Updated 2 months ago
- Explore a website's internal links, then visualize those connections as a network graph with scorecards and analysis using Claude AI.☆85Updated last month
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 8 months ago
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆30Updated last year
- Daily updates from leaked data search engines, aggregators and similar services.☆110Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Collection of videos of Raids on Cybercriminals☆20Updated 3 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 2 months ago
- ☆12Updated 3 months ago
- Drill into WARC web archives☆140Updated 9 months ago
- Honeypot Service Simulator☆23Updated 10 months ago
- masscan with exclusive excludes☆57Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆138Updated last month
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- ☆28Updated last year
- ☆54Updated 5 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆41Updated 3 weeks ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆35Updated last month
- ☆18Updated 2 weeks ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆42Updated 4 months ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆148Updated 9 months ago