digininja / scanner_user_agentsLinks
A list of user agents belonging to common web scanners.
☆40Updated 3 years ago
Alternatives and similar repositories for scanner_user_agents
Users that are interested in scanner_user_agents are comparing it to the libraries listed below
Sorting:
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- CLI tools using Harpoon features☆22Updated last year
- Various scripts and codes☆85Updated 4 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ☆33Updated 9 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆72Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 4 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated last year
- URL fingerprinting made easy☆89Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- ☆21Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- Port Crawler Pythonized☆19Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆22Updated 5 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆50Updated last year
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- ☆42Updated 6 months ago
- ☆33Updated 2 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago