URL fingerprinting made easy
☆89Apr 13, 2024Updated last year
Alternatives and similar repositories for shimon
Users that are interested in shimon are comparing it to the libraries listed below
Sorting:
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 5 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- ☆35Jan 13, 2026Updated last month
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last week
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 6 months ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Jul 11, 2023Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆38Dec 9, 2025Updated 2 months ago
- ☆18Mar 26, 2024Updated last year
- Spam trap management☆23Jun 18, 2024Updated last year
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- a common schema for internet-connected service discovery 🔎 📚☆23Jan 29, 2026Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- A collection of infosec related scripts and information.☆53Oct 2, 2024Updated last year
- OSINT-compass is a powerful tool for collecting, organizing, and analyzing open-source information from various sources.☆17Apr 26, 2023Updated 2 years ago
- ☆16Apr 30, 2024Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Nov 6, 2023Updated 2 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 3 months ago
- AXFR all the things!☆29Sep 21, 2025Updated 5 months ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago