gbiagomba / SherlockLinks
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆87Updated 2 weeks ago
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆123Updated last month
- Stalker, the Extensible Attack Surface Management tool.☆87Updated last week
- a hackbot proof-of-concept☆40Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- The DNS Hunt will make your life easier, and of course faster.☆48Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated last week
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆77Updated 2 years ago
- 📙 User documentation for Caido☆31Updated this week
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆58Updated last year
- ☆34Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Identify hardcoded secrets in static structured text (version 2)☆94Updated 8 months ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 6 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- AWS, Azure, Alibaba and Google bucket scanner☆156Updated 2 years ago