gbiagomba / SherlockLinks
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆86Updated last year
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Stalker, the Extensible Attack Surface Management tool.☆86Updated this week
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆123Updated 2 weeks ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- a hackbot proof-of-concept☆40Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- Identify hardcoded secrets in static structured text (version 2)☆93Updated 7 months ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 3 months ago
- Autonomous AI C2☆32Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 8 months ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Efficient DevSecOps☆47Updated 2 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- If these strings are in your code, you might have a problem!☆52Updated 3 weeks ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 4 years ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Hijack a slack bot to phish your way in☆56Updated 2 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆56Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- AWS, Azure, Alibaba and Google bucket scanner☆157Updated 2 years ago