kevthehermit / PasteHunterLinks
Scanning pastebin with yara rules
☆1,121Updated last week
Alternatives and similar repositories for PasteHunter
Users that are interested in PasteHunter are comparing it to the libraries listed below
Sorting:
- CLI tool for open source and threat intelligence☆1,252Updated 9 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,308Updated 11 months ago
- A default credential scanner.☆1,500Updated 5 months ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆651Updated 3 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,540Updated last year
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- A list of shodan filters☆579Updated 7 years ago
- Pastebin OSINT Harvester☆325Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,029Updated 5 years ago
- SimplE RePort wrIting and COllaboration tool☆1,115Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆654Updated 3 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆480Updated 3 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,360Updated this week
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Updated 3 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- A Nmap XSL implementation with Bootstrap.☆960Updated 2 years ago
- Machinae Security Intelligence Collector☆537Updated last year
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆468Updated 6 months ago
- Setup script for Regon-ng☆936Updated 5 years ago
- Red Team Tactics, Techniques, and Procedures☆418Updated 2 months ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆847Updated last year
- Collection of Scripts for shodan searching stuff.☆1,131Updated last week
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Updated 4 years ago
- Tool to search secrets in various filetypes.☆1,028Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,178Updated 3 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆656Updated last week
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Modern tactical exploitation toolkit.☆853Updated last month
- Links for the OSINT Team☆609Updated 3 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆677Updated 2 years ago