ecstatic-nobel / Aisle25
Detect leaks in security event logs.
☆20Updated 5 years ago
Alternatives and similar repositories for Aisle25:
Users that are interested in Aisle25 are comparing it to the libraries listed below
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- ☆34Updated 2 months ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- ☆30Updated 6 years ago
- ☆11Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 12 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- ☆11Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆12Updated 7 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago