kaansk / shomonView external linksLinks
Shodan Monitoring integration for TheHive.
☆130Dec 12, 2024Updated last year
Alternatives and similar repositories for shomon
Users that are interested in shomon are comparing it to the libraries listed below
Sorting:
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- ☆133Jan 25, 2023Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Apr 19, 2022Updated 3 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication se…☆26Jul 18, 2022Updated 3 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆21Updated this week
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated last month
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- A Python obfuscator using HTTP Requests and Hastebin.☆50Jul 1, 2022Updated 3 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Jul 18, 2024Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Feb 5, 2026Updated last week
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆206Apr 3, 2025Updated 10 months ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆83Dec 18, 2025Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆51Jan 20, 2026Updated 3 weeks ago
- First iteration of ML based Feedback WAF☆59Mar 20, 2024Updated last year
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,121Updated this week
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Nov 22, 2023Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago