emilymaxima / KrangTools
Simple NLP and bulk OCR text processing script suite.
☆47Updated 6 years ago
Alternatives and similar repositories for KrangTools:
Users that are interested in KrangTools are comparing it to the libraries listed below
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- first commit☆20Updated last year
- A web spider's worst nightmare.☆53Updated 12 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Universal Honey Pot☆29Updated 2 years ago
- Funnel is a lightweight yara-based feed scraper☆39Updated last year
- Insiderer looks inside files for metadata and hidden content☆37Updated 9 years ago
- Extract deleted secrets from git repos☆60Updated 7 years ago
- ☆15Updated 9 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Local Maltego Transforms for crt.sh☆12Updated 7 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- The Zonefile Transfer Toolkit☆28Updated 3 weeks ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Rogue AP killer☆89Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- ☆25Updated 7 years ago
- Inside hundreds of surveillance experiments along the US-Mexico border☆127Updated 5 years ago
- The code used in the "Don't @ Me: Hunting Twitter Bots at Scale" Black Hat presentation☆151Updated 4 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago