URL fingerprinting made easy
☆89Apr 13, 2024Updated 2 years ago
Alternatives and similar repositories for shimon
Users that are interested in shimon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- An npm package to defang and refang IoC☆13Apr 11, 2026Updated 3 weeks ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆24Sep 28, 2022Updated 3 years ago
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆15Oct 15, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 11, 2026Updated 3 weeks ago
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated last month
- C2 Active Scanner☆58Jun 19, 2024Updated last year
- ☆35Jan 13, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆43Jan 31, 2025Updated last year
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated 2 years ago
- DEPRECATED, moved as GHA on polkadot-sdk☆15Jan 21, 2025Updated last year
- ☆16Apr 30, 2024Updated 2 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Apr 14, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆47Nov 10, 2025Updated 5 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆119Updated this week
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 8 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆20Updated this week
- This is a webshell open source project☆10Oct 7, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- Collection of OSINT articles to get you started in understanding OSINT techniques☆34Nov 13, 2021Updated 4 years ago
- ☆37Jul 10, 2015Updated 10 years ago