kevthehermit / PasteHunter
Scanning pastebin with yara rules
☆1,082Updated 8 months ago
Alternatives and similar repositories for PasteHunter:
Users that are interested in PasteHunter are comparing it to the libraries listed below
- A default credential scanner.☆1,471Updated 3 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,484Updated 11 months ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆775Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,262Updated last month
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,146Updated 2 years ago
- Collection of Scripts for shodan searching stuff.☆1,091Updated 3 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,218Updated last year
- Security Tool to Look For Interesting Files in S3 Buckets☆1,389Updated 10 months ago
- Pastebin OSINT Harvester☆321Updated 5 years ago
- SimplE RePort wrIting and COllaboration tool☆1,095Updated 4 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,315Updated this week
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆629Updated 2 years ago
- A list of shodan filters☆554Updated 6 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,108Updated last year
- CLI tool for open source and threat intelligence☆1,196Updated this week
- Red Team Tactics, Techniques, and Procedures☆397Updated this week
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,478Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆880Updated this week
- Automatically Launch Google Hacking Queries Against A Target Domain☆719Updated 11 months ago
- A Nmap XSL implementation with Bootstrap.☆943Updated last year
- A curated list of the most common and most interesting robots.txt disallowed directories.☆1,446Updated 2 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Modern tactical exploitation toolkit.☆841Updated 7 months ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆743Updated 5 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,384Updated last month
- Command-line tool to scan Google search results for vulnerabilities☆518Updated last week
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,007Updated 4 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆405Updated 6 years ago