gbiagomba / Sherlock
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆83Updated 4 months ago
Alternatives and similar repositories for Sherlock:
Users that are interested in Sherlock are comparing it to the libraries listed below
- Stalker, the Extensible Attack Surface Management tool.☆80Updated this week
- A fast network scanning tool to detect open ports and security vulnerabilities☆98Updated 3 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- A Pentest Collaboration and Reporting Tool☆54Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆154Updated 10 months ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated last year
- a hackbot proof-of-concept☆37Updated 11 months ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆71Updated 10 months ago
- Hijack a slack bot to phish your way in☆43Updated last month
- A repository with informtion related to Cloud Osint☆80Updated 2 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆65Updated 7 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆65Updated this week
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated last month
- Shodan Monitoring integration for TheHive.☆130Updated last month
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆54Updated 10 months ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆46Updated 9 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆46Updated 3 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- Modular web-application honeypot platform built using go and gin☆54Updated 8 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆88Updated 9 months ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆68Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 5 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆36Updated 2 months ago
- ☆12Updated 3 years ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 11 months ago
- God Mode Detection Rules☆133Updated 5 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 6 months ago
- MayorSec DNS Enumeration Tool☆82Updated 2 months ago