joshhighet / bebop
reveal origins behind reverse proxies & hidden services π π§
π»
β28Updated last year
Alternatives and similar repositories for bebop:
Users that are interested in bebop are comparing it to the libraries listed below
- Collection of videos of Raids on Cybercriminalsβ18Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.β86Updated 9 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β37Updated last year
- C2 Active Scannerβ51Updated 7 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.β53Updated 7 months ago
- β42Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated 10 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscapeβ109Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.β27Updated last year
- Capture screenshots of onion services on an onion service.β50Updated 7 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ50Updated 3 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCPβ17Updated last month
- Providing Azure pipelines to create an infrastructure and run Atomic tests.β50Updated last year
- β23Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>β45Updated this week
- Distributed phishing framework designed to streamline offensive security phishingβ39Updated last year
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.β12Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β29Updated 8 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).β51Updated 9 months ago
- Can you pay the ransom in your country?β13Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.β60Updated 3 years ago
- β37Updated 3 years ago
- One line command and control backdoors for APIs and web applications.β50Updated 9 months ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigmaβ27Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from β¦β13Updated 4 months ago
- Hive v5 file decryption algorithmβ34Updated 2 years ago
- β17Updated last year
- URL fingerprinting made easyβ82Updated 9 months ago