kevthehermit / PasteHunter
Scanning pastebin with yara rules
☆1,067Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for PasteHunter
- Discover Your Attack Surface!☆1,362Updated 2 years ago
- A default credential scanner.☆1,453Updated 2 years ago
- Links for the OSINT Team☆573Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆619Updated 2 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,306Updated this week
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,455Updated 8 months ago
- CLI tool for open source and threat intelligence☆1,177Updated 11 months ago
- A collection of sources of indicators of compromise.☆806Updated last month
- Modern tactical exploitation toolkit.☆834Updated 4 months ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆829Updated 6 months ago
- Collection of Scripts for shodan searching stuff.☆1,067Updated 5 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,201Updated 11 months ago
- Pastebin OSINT Harvester☆317Updated 5 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,531Updated last year
- A list of shodan filters☆547Updated 5 years ago
- ⚡ Perform subdomain enumeration using the certificate transparency logs from Censys.☆743Updated last year
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆479Updated 7 years ago
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,545Updated 5 months ago
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- Online hash checker for Virustotal and other services☆809Updated 6 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,228Updated 2 years ago
- A Python Package for Data Exfiltration☆763Updated 6 months ago
- Network reconnaissance and vulnerability assessment tools.☆395Updated 2 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆712Updated 8 months ago
- Email recon made fast and easy, with a framework to build on☆949Updated last year
- FAME Automates Malware Evaluation☆862Updated this week
- Red Team Tips as posted by @vysecurity on Twitter☆1,049Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,019Updated last month
- OSINT Swiss Army Knife☆624Updated 3 years ago