forcesunseen / netsec-goggle
High signal information security sources Goggle.
☆66Updated last year
Related projects: ⓘ
- ☆78Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- URL fingerprinting made easy☆80Updated 5 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆143Updated 11 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆131Updated 2 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆33Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆76Updated 11 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 2 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆28Updated 8 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 9 months ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆129Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆74Updated 4 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆100Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆55Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆121Updated 11 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆38Updated 2 years ago
- All kinds of tiny shells☆59Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆57Updated 10 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆52Updated 3 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆61Updated 5 months ago
- Open IOC sharing platform☆52Updated 11 months ago
- nse script to inject jndi payloads☆45Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bytesqatting, and homoglyph domain attacks and brand impersonation☆35Updated 9 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆76Updated this week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- ☆42Updated 2 years ago
- God Mode Detection Rules☆130Updated last month