nl5887 / notebooks
Notebook collection
☆10Updated 6 years ago
Alternatives and similar repositories for notebooks:
Users that are interested in notebooks are comparing it to the libraries listed below
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Useful commands for infosec☆29Updated 2 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- ☆14Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Python bindings for Yeti's API☆18Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- ☆15Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- ☆12Updated 8 years ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago