ecstatic-nobel / Aisle25Links
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- Pentest ToolKit☆28Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Custom Maltego transforms☆68Updated 10 years ago
- ☆33Updated 7 months ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆54Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆66Updated 4 years ago
- devops scripts☆32Updated 8 years ago
- A curated list of awesome infosec resources.☆29Updated 10 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆84Updated 4 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆94Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆15Updated 6 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- ☆14Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago