gbiagomba / SherlockLinks
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆87Updated 2 weeks ago
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 2 years ago
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆122Updated 2 months ago
- a hackbot proof-of-concept☆40Updated last year
- Stalker, the Extensible Attack Surface Management tool.☆87Updated this week
- Shodan Monitoring integration for TheHive.☆131Updated 11 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- Modular web-application honeypot platform built using go and gin☆61Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆79Updated 2 years ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆36Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 7 months ago
- The DNS Hunt will make your life easier, and of course faster.☆48Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- A WLAN red team framework.☆155Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Hijack a slack bot to phish your way in☆57Updated 4 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆80Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- Autonomous AI C2☆32Updated last year