grahamhelton / spoofpointLinks
Spoofpoint is a domain monitoring tool that allows you to generate a list of domains that are 1 character off of your domain (grahamhelton.com turns into -> grahamheIton.com ((The L is a capital I )), check a list of domains you already have, or check as single domain.
☆42Updated last year
Alternatives and similar repositories for spoofpoint
Users that are interested in spoofpoint are comparing it to the libraries listed below
Sorting:
- MayorSec DNS Enumeration Tool☆87Updated 6 months ago
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆41Updated 6 months ago
- ☆35Updated 7 months ago
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆51Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last week
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated last month
- ☆55Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 7 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆33Updated 11 months ago
- ☆31Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- ☆22Updated last week
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- URL fingerprinting made easy☆86Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆40Updated 4 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- List of Command&Control (C2) software☆41Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- Fly into Gophish with One Click (Infra Automation)☆49Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆74Updated last month
- Ansible playbook to automate environmental setup for internal and external penetration testing☆29Updated 2 years ago
- ☆54Updated 5 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- ☆77Updated last year