digininja / scanner_user_agents
A list of user agents belonging to common web scanners.
☆38Updated 2 years ago
Related projects: ⓘ
- ☆20Updated last year
- CLI tools using Harpoon features☆21Updated 10 months ago
- ☆33Updated 6 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year
- Hashes of infamous malware☆24Updated last year
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆30Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆15Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆24Updated 3 weeks ago
- adtool Active Directory administration utility for Unix☆10Updated 10 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- ☆28Updated 6 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆52Updated 3 months ago
- Simple DNS logging server☆18Updated 2 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated last year
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆25Updated 4 years ago
- Yet another way to find where to report an abuse☆31Updated 2 months ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆54Updated this week
- ☆20Updated this week
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated 2 weeks ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆10Updated 4 years ago