cyberytti / ToolHuntLinks
This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.
β102Updated 3 weeks ago
Alternatives and similar repositories for ToolHunt
Users that are interested in ToolHunt are comparing it to the libraries listed below
Sorting:
- π΄ββ οΈ Hacking Guides, Demos and Proof-of-Concepts π₯·β207Updated last month
- A RAG model trained on malware samples, It is designed to generate new malwareβ42Updated 2 weeks ago
- A visual methodology tracking platform tailored for offensive security assessmentsβ223Updated last month
- Darkweb_Crawler - an advanced version of DEEPWEBHARVESTER is a Python-based OSINT (Open-Source Intelligence) tool designed for ethical seβ¦β41Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β79Updated last month
- A blind SQL injection brute forcerβ111Updated 6 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.β464Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β126Updated 7 months ago
- DPULSE - Tool for complex approach to domain OSINTβ153Updated this week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysisβ324Updated 2 weeks ago
- β223Updated 3 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!β267Updated 4 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered featuresβ144Updated this week
- Quick scripts I developed to streamline OSCP tasksβ186Updated 4 months ago
- β127Updated 4 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.β182Updated last month
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware anβ¦β44Updated 6 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.β71Updated 3 weeks ago
- Parse and analyze a Windows Amcache.hve registry hive, VirusTotal integration.β96Updated 2 months ago
- NetProbe: Network Probeβ164Updated last year
- β38Updated last year
- π PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connβ¦β316Updated 6 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads πͺβ276Updated last year
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting Systemβ161Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β197Updated last week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilitiesβ263Updated 7 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconβ¦β41Updated 2 weeks ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware researchβ316Updated last month
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β57Updated 3 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.β200Updated last year