kevthehermit / PasteHunterLinks
Scanning pastebin with yara rules
☆1,105Updated 3 months ago
Alternatives and similar repositories for PasteHunter
Users that are interested in PasteHunter are comparing it to the libraries listed below
Sorting:
- A default credential scanner.☆1,498Updated 3 months ago
- A list of shodan filters☆577Updated 6 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,297Updated 8 months ago
- CLI tool for open source and threat intelligence☆1,241Updated 7 months ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆645Updated 3 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,348Updated this week
- Tool to search secrets in various filetypes.☆1,023Updated 2 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,535Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,025Updated 5 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆674Updated last year
- Collection of Scripts for shodan searching stuff.☆1,122Updated 3 months ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆472Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆746Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆655Updated 3 years ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆822Updated 5 months ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,256Updated last month
- Modern tactical exploitation toolkit.☆852Updated 2 weeks ago
- A Python Package for Data Exfiltration☆796Updated 3 months ago
- Command-line tool to scan Google search results for vulnerabilities☆531Updated 3 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆635Updated 2 years ago
- Setup script for Regon-ng☆935Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆1,381Updated 5 years ago
- SimplE RePort wrIting and COllaboration tool☆1,110Updated 5 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,175Updated 2 years ago
- Phishing catcher using Certstream☆1,764Updated last year
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆460Updated 3 months ago
- Red Team Tactics, Techniques, and Procedures☆416Updated last week
- Security Tool to Look For Interesting Files in S3 Buckets☆1,435Updated last year