l0gan / domainCatLinks
Check Domain Categorization
☆76Updated 4 years ago
Alternatives and similar repositories for domainCat
Users that are interested in domainCat are comparing it to the libraries listed below
Sorting:
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆83Updated 2 months ago
- Simple parser framework.☆27Updated 2 years ago
- Resolves an IP address to the cloud provider it is hosted on☆97Updated this week
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆70Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆17Updated 2 years ago
- ☆69Updated 4 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆84Updated 10 months ago
- A Django application to help red team operators manage a library of domain names☆166Updated 2 years ago
- Scrape, Hunt, and Transform names and usernames☆124Updated 2 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- Import Nmap scans to Cherrytree☆37Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 5 years ago
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- Library of sites for categorization☆28Updated 6 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- ☆116Updated 6 months ago
- ☆41Updated 5 years ago
- Script for Enumerating SaaS offerings of a specific domain through DNS queries☆43Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Updated 4 years ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- My Python Cookiecutter project template☆32Updated 3 years ago
- MimeCast Password Spraying Tool☆47Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 2 months ago
- Electron based screenshot scanner☆68Updated 2 years ago