Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.
☆62Jul 18, 2024Updated last year
Alternatives and similar repositories for InfraHunter
Users that are interested in InfraHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆152Jun 14, 2023Updated 2 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Live Feed of C2 servers, tools, and botnets☆756Mar 16, 2026Updated last week
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- a common schema for internet-connected service discovery 🔎 📚☆23Mar 17, 2026Updated last week
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- Search for URLs in files (optionally limited by extension) and validate their HTTP status code☆24Mar 24, 2020Updated 6 years ago
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last month
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Jun 13, 2024Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- Powershell module for VMWare vSphere forensics☆170Nov 8, 2024Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Updated this week
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- ☆27Aug 15, 2022Updated 3 years ago