phantom0004 / morpheus_IOC_scannerLinks
Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse formats, redefining cybersecurity defense.
☆53Updated 7 months ago
Alternatives and similar repositories for morpheus_IOC_scanner
Users that are interested in morpheus_IOC_scanner are comparing it to the libraries listed below
Sorting:
- 🕵️ Email osint tool☆62Updated 2 years ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆153Updated 6 months ago
- NetProbe: Network Probe☆164Updated 11 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆30Updated 2 weeks ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated 4 months ago
- ☆65Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 2 years ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆55Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆60Updated last month
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆30Updated 4 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 3 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 8 months ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆44Updated 5 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆126Updated last month
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated last month
- PassBreaker☆63Updated last year
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 8 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated 8 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆24Updated last year
- PacketSpy☆157Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆39Updated 9 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆55Updated 2 months ago