phantom0004 / morpheus_IOC_scannerLinks
Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Indicators of Compromise with unmatched precision across diverse formats, redefining cybersecurity defense.
☆55Updated 10 months ago
Alternatives and similar repositories for morpheus_IOC_scanner
Users that are interested in morpheus_IOC_scanner are comparing it to the libraries listed below
Sorting:
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆164Updated 9 months ago
- NetProbe: Network Probe☆171Updated last year
- 🕵️ Email osint tool☆63Updated 2 years ago
- Discovering Typo Squatting on your domains!☆79Updated last year
- ☆65Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆92Updated 7 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated last year
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆33Updated 4 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆92Updated 7 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 5 months ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆46Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- ☆55Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- ☆24Updated 2 years ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆55Updated 11 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆34Updated last month
- IoT Camera Reconnaissance and Live Viewer☆168Updated last year
- PassBreaker☆66Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆70Updated 5 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 9 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated last year