Extract, defang, resolve names and IPs from text
☆23Jan 29, 2026Updated last month
Alternatives and similar repositories for ipgrep
Users that are interested in ipgrep are comparing it to the libraries listed below
Sorting:
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- A simple, but damn fast sinkhole☆65Dec 27, 2025Updated 2 months ago
- Tui Utility to test REST APIs☆13Nov 20, 2023Updated 2 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Oct 29, 2014Updated 11 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Script to spider a website and find publicly open S3 buckets☆29Oct 1, 2020Updated 5 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆45Jul 9, 2025Updated 7 months ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Mar 6, 2018Updated 7 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- The main gravwell monorepo for ingesters and ingest code☆52Updated this week
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Configure Internal iOS Settings, like SpringBoard, Carrier Settings, Mobile Asset Settings.☆10Mar 6, 2019Updated 6 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- public exploits☆35May 11, 2023Updated 2 years ago
- Backup program , menu based , CLI TUI utility for Linux distributions using Tar and rsync. Written in bash, CLI program.☆15Sep 24, 2022Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- A Powershell wrapper around the Voiceemeter Remote API☆14Feb 19, 2026Updated last week
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Dec 31, 2025Updated 2 months ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- ☆14Nov 23, 2024Updated last year
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆43Jan 14, 2026Updated last month