plasticuproject / hibpwnedLinks
Python API wrapper for haveibeenpwned.com (API v3)
☆39Updated last year
Alternatives and similar repositories for hibpwned
Users that are interested in hibpwned are comparing it to the libraries listed below
Sorting:
- Script to scrape untappd.com content☆150Updated 2 months ago
- Python wrapper for urlscan.io's API☆105Updated 3 years ago
- Domain name permutation as a service☆65Updated 7 months ago
- An application to analyze the EML file☆293Updated 3 weeks ago
- Sample programs to access the API☆92Updated 5 months ago
- Traps web spiders☆76Updated 5 years ago
- AbuseIpDB - Wrapper around the AbuseIPDb service API☆16Updated last year
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆72Updated 2 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆91Updated this week
- ☆133Updated 4 years ago
- A server providing RESTful access to CyberChef☆160Updated 7 months ago
- ☆234Updated 5 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆254Updated 2 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Wrap any binary into a cached webserver☆55Updated 3 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 4 months ago
- MISP Docker (XME edition)☆283Updated last year
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 7 years ago
- Useful SQL queries for Nexpose☆19Updated 8 years ago
- Nmap Web Interface including XML parsing, maps and reports☆56Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated this week
- The simplest way to find how to report abusive domains☆54Updated 2 years ago
- ☆119Updated 2 years ago
- A list of OPML Security Feeds☆76Updated 6 months ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- an awesome list of active defense resources☆126Updated 5 years ago