Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.
☆62Jul 18, 2024Updated last year
Alternatives and similar repositories for InfraHunter
Users that are interested in InfraHunter are comparing it to the libraries listed below
Sorting:
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- ☆151Jun 14, 2023Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- a common schema for internet-connected service discovery 🔎 📚☆23Jan 29, 2026Updated last month
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Dec 20, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Automatically spin up infra for phishing☆64Feb 1, 2020Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- General Content☆25Dec 23, 2025Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- ☆18May 6, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- ☆14Mar 9, 2023Updated 2 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 7 months ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago