Python wrapper for urlscan.io's API
☆105Oct 28, 2021Updated 4 years ago
Alternatives and similar repositories for urlscan-py
Users that are interested in urlscan-py are comparing it to the libraries listed below
Sorting:
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆44Jul 25, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- ☆28Jul 5, 2025Updated 8 months ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- ☆537Feb 26, 2026Updated last week
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16May 15, 2024Updated last year
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Gotanda is browser Web Extension for OSINT.☆195Oct 11, 2023Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆312Jan 26, 2021Updated 5 years ago
- C programming example codes.☆10Apr 30, 2021Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Jul 10, 2025Updated 8 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- README☆10Updated this week
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- A nicer look at my GitHub profile and repository stats with data visualizations of my top languages and stars. Sort through your top repo…☆13Jun 19, 2022Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- CVE-2020-5902☆10Jul 11, 2020Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆147Feb 12, 2025Updated last year
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- department of turtles☆20Nov 6, 2025Updated 4 months ago
- Using censys to find subdomains but without the APIs just scrapping☆16May 13, 2020Updated 5 years ago
- Mirror of Dr. Bolsen's Java decompiler for BlackBerry apps☆13Apr 20, 2015Updated 10 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- ☆82Jun 27, 2021Updated 4 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 9 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago