jimywork / certstreamcatcher
This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect punycode (IDNA) attacks.
☆81Updated 6 years ago
Alternatives and similar repositories for certstreamcatcher:
Users that are interested in certstreamcatcher are comparing it to the libraries listed below
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Metasploit Framework☆26Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Subdomain Analyzer☆76Updated 7 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 9 months ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago