hazcod / dnstwistLinks
A tool to monitor for potential spear phishing domains and send to Slack.
☆23Updated last year
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆51Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated last year
- Virtual Security Operations Center☆52Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆33Updated 3 years ago
- Identify IP addresses owned by public cloud providers☆126Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- Collection of useful Canary tools☆91Updated last month
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆24Updated 7 months ago
- ☆18Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Bulk hostname lookup using shodan☆14Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Updated 7 years ago
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- ☆114Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆41Updated 6 months ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Updated 8 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- ☆139Updated 2 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 5 months ago