hessman / gcert
Retrieves information about a given domain from the Google Transparency Report : https://transparencyreport.google.com/https/certificates
☆21Updated 3 years ago
Alternatives and similar repositories for gcert:
Users that are interested in gcert are comparing it to the libraries listed below
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- ☆54Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Simple parser to get useful information from AWS S3 logs☆25Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆24Updated this week
- C2 Active Scanner☆55Updated 9 months ago
- ☆41Updated 11 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- A tool to assist in the development of landing pages for phishing campaigns☆15Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- ☆34Updated last year
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- ☆54Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆87Updated 9 months ago
- Posts about different topics☆36Updated last year
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- Easy to configure Honeypot for Blue Team☆39Updated 9 months ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- A home for detection content developed by the delivr.to team☆67Updated last month
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Updated 2 years ago
- blame Huy☆42Updated 4 years ago