hazcod / dnstwistLinks
A tool to monitor for potential spear phishing domains and send to Slack.
☆23Updated last year
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆37Updated 11 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 11 months ago
- InfoSec OpenAI Examples☆19Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆106Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 5 months ago
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆23Updated 6 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 6 months ago
- ☆120Updated 2 weeks ago
- ☆114Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Identify IP addresses owned by public cloud providers☆126Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- Bulk hostname lookup using shodan☆15Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- Collection of useful Canary tools☆92Updated last week
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Examine Chrome extensions for security issues☆87Updated this week
- Technical Tabletop Exercises Simulation Framework☆48Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year