ninoseki / shimon
URL fingerprinting made easy
☆79Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for shimon
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆53Updated 4 months ago
- Ransomware groups posts☆34Updated this week
- A repository with informtion related to Cloud Osint☆79Updated last week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆54Updated 3 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆42Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated this week
- ☆34Updated 6 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Sniffing out well-known threat groups☆28Updated 2 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆52Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆21Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- A collection of cyberchef recipes for use in osint investigations☆13Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago