hazcod / dnstwistLinks
A tool to monitor for potential spear phishing domains and send to Slack.
☆23Updated 2 years ago
Alternatives and similar repositories for dnstwist
Users that are interested in dnstwist are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆52Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆130Updated last year
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆42Updated 8 months ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Typosquatting tool that supports OSINT investigations, and designed to operate on multilingual target domains.☆25Updated 8 months ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- Collection of useful Canary tools☆93Updated last week
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 5 years ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated 2 weeks ago
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- Cloud Security Operations Orchestrator☆188Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 4 months ago
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated last week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated 2 weeks ago
- Recon Hunt Queries☆79Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago