diogo-fernan / domfindLinks
A Python DNS crawler to find identical domain names under different TLDs.
☆25Updated 6 years ago
Alternatives and similar repositories for domfind
Users that are interested in domfind are comparing it to the libraries listed below
Sorting:
- Useful commands for infosec☆29Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- HoneyDB Python Module☆13Updated last year
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated 2 years ago
- ☆24Updated 2 years ago
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 6 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 10 months ago
- Scans the typos of candidate election pages for typosquatters☆18Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- ☆30Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com☆16Updated 2 weeks ago
- ☆14Updated 7 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- ☆33Updated 5 months ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 7 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 5 months ago