gbiagomba / SherlockLinks
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆86Updated last month
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆124Updated 4 months ago
- Red Kite, the Extensible Attack Surface Management tool.☆90Updated this week
- a hackbot proof-of-concept☆41Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆109Updated last month
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Updated 5 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Identify hardcoded secrets in static structured text (version 2)☆97Updated 11 months ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆80Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆34Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated 2 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆57Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 3 years ago
- Curated collection of OSINT resources for cloud infrastructure reconnaissance. Includes IP ranges, DNS patterns, bucket discovery tools, …☆110Updated last week
- A network logging tool that logs per process activities☆32Updated 2 years ago
- If these strings are in your code, you might have a problem!☆49Updated last month
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago