heywoodlh / urlscan-pyLinks
Python wrapper for urlscan.io's API
☆102Updated 3 years ago
Alternatives and similar repositories for urlscan-py
Users that are interested in urlscan-py are comparing it to the libraries listed below
Sorting:
- Domain name permutation as a service☆62Updated 3 months ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆38Updated last year
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 10 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Updated 11 months ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Gather Open-Source Intelligence using PowerShell.☆175Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- automate your MISP installs☆68Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- GreyNoise Query Language☆82Updated 6 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆26Updated 11 months ago
- Files vetted, and approved for public release☆53Updated last year
- Orca - Targeted OSINT Framework☆90Updated last year
- Python3 interface for the EmailRep API☆53Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 4 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 10 months ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Fast IOC and YARA Scanner☆80Updated 5 years ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 6 months ago
- The simplest way to find how to report abusive domains☆56Updated 2 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- An uploader honeypot designed to look like poor website security.☆28Updated 2 months ago