gbiagomba / SherlockLinks
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
☆87Updated last month
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- Stalker, the Extensible Attack Surface Management tool.☆87Updated 3 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A fast network scanning tool to detect open ports and security vulnerabilities (Compatible with Debian & Red Hat OS)☆122Updated 2 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- a hackbot proof-of-concept☆40Updated last year
- If these strings are in your code, you might have a problem!☆50Updated 2 months ago
- Efficient DevSecOps☆47Updated 4 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated last week
- Nuclei plugins to audit Chrome extensions☆65Updated last year
- A fast and comprehensive tool for organizational network scanning☆135Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- The DNS Hunt will make your life easier, and of course faster.☆48Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆105Updated 10 months ago
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆80Updated 2 years ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Updated last year
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- Identify hardcoded secrets in static structured text (version 2)☆95Updated 9 months ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆38Updated 2 weeks ago
- ☆24Updated 4 months ago
- A WLAN red team framework.☆155Updated last year
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆59Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Updated last year