hazcod / dnstwistLinks
A tool to monitor for potential spear phishing domains and send to Slack.
☆23Updated last year
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆51Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 10 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆36Updated 10 months ago
- Collection of useful Canary tools☆92Updated 2 weeks ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated 3 weeks ago
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆22Updated 5 months ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Updated 3 years ago
- Phishing campaign docker composition for Gophish☆43Updated 2 weeks ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆18Updated 9 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- ☆139Updated 2 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- ☆60Updated 2 years ago