ecstatic-nobel / Aisle25Links
Detect leaks in security event logs.
☆20Updated 6 years ago
Alternatives and similar repositories for Aisle25
Users that are interested in Aisle25 are comparing it to the libraries listed below
Sorting:
- Pentest ToolKit☆28Updated 5 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- ☆21Updated 2 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- ☆33Updated 4 months ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆56Updated 10 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- intrusion detection☆24Updated 7 years ago
- ☆14Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A curated list of awesome infosec resources.☆28Updated 10 years ago
- Maltego transform for visualizing Nessus scan data☆47Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- Random collection of exploit code, tools, scripts, etc.☆26Updated 10 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆65Updated 7 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- ☆15Updated this week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago