hazcod / dnstwistLinks
A tool to monitor for potential spear phishing domains and send to Slack.
☆23Updated last year
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Collection of useful Canary tools☆91Updated 2 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 10 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Identify IP addresses owned by public cloud providers☆126Updated last year
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆52Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆164Updated last week
- ☆119Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 6 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆106Updated last month
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 4 months ago
- Cloud Security Operations Orchestrator☆188Updated last year
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 5 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆22Updated 4 months ago