phantom0004 / morpheus_IOC_scannerLinks
Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse formats, redefining cybersecurity defense.
☆54Updated 11 months ago
Alternatives and similar repositories for morpheus_IOC_scanner
Users that are interested in morpheus_IOC_scanner are comparing it to the libraries listed below
Sorting:
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- Discovering Typo Squatting on your domains!☆81Updated last year
- 🕵️ Email osint tool☆64Updated 2 years ago
- NetProbe: Network Probe☆173Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36Updated last year
- ☆65Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆90Updated 8 months ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 5 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated 2 years ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆56Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Updated 6 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆35Updated 2 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- ☆24Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated 2 years ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last year
- PassBreaker☆65Updated last year
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- Tools and Resources for Physical Security Red Teaming☆46Updated 2 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Updated last month
- ☆44Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆46Updated 9 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago