pzaino / thecrowlerLinks
A Content Discovery and Development Platform. Empowering Cybersecurity, AI, Marketing, and Finance professionals and researchers to discover, analyze, and interact with the web in all its dimensions.
☆47Updated last week
Alternatives and similar repositories for thecrowler
Users that are interested in thecrowler are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Check whether an IP address or hostname belongs to popular cloud providers☆62Updated this week
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆12Updated 9 months ago
- Collection of videos of Raids on Cybercriminals☆20Updated 3 months ago
- 🔗 A curated list of awesome Caido related projects☆40Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆50Updated last month
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆28Updated 2 years ago
- Legba recipes.☆50Updated 10 months ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 10 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆111Updated this week
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- Distributed nmap.☆13Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆62Updated 2 years ago
- Archive of Potential Insider Threats☆147Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Database interaction layer to store open-asset-models in sqlite3 and postgres☆18Updated 3 weeks ago
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- masscan with exclusive excludes☆57Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated 2 years ago