picatz / falconzLinks
π¦
Falcon Malware Sandbox APIv2 Connector
β30Updated 2 years ago
Alternatives and similar repositories for falconz
Users that are interested in falconz are comparing it to the libraries listed below
Sorting:
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 7 years ago
- collection of useful shells for penetration testsβ37Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you providedβ33Updated 4 years ago
- A collection of scripts made duing my personal researchβ29Updated 6 years ago
- β26Updated 5 years ago
- Search the ExploitDB with a little more controlβ21Updated 8 years ago
- Shodan.io connector for Phantom Cyber Security Orchestrationβ22Updated 8 years ago
- Tool for automation of GUI-based testing.β16Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sourcesβ38Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.β17Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domainsβ25Updated 6 years ago
- PHP Phishing Frameworkβ28Updated 11 years ago
- Β΅phisher spear phishing tool (reference implementation)β40Updated 5 years ago
- A tool to help you manage your leaksβ34Updated 7 years ago
- Simple web app for displaying cowrie data in your browserβ12Updated 9 years ago
- Get detailed information about a Twitter user activityβ17Updated 7 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/β16Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmailβ36Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkinsβ25Updated 9 months ago
- A short and small memory forensics helper.β52Updated 7 years ago
- Puny Domain Name Checkβ37Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.β30Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.β25Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETWβ32Updated 8 years ago
- ssh session type for metasploitβ100Updated 2 years ago
- A curated list of tools for incident responseβ31Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).β64Updated 6 years ago
- Twitter Bot to perform advanced search and automated responseβ13Updated 7 years ago