☆34Jan 22, 2025Updated last year
Alternatives and similar repositories for Maltego-Scripts
Users that are interested in Maltego-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Suite extension to discover assets from HTTP response.☆233Jan 22, 2025Updated last year
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- Maltego Transforms, Machines and other extentions☆45Jul 17, 2015Updated 10 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Sep 22, 2021Updated 4 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- ☆12Jan 7, 2020Updated 6 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Custom Maltego transforms☆67Feb 27, 2015Updated 11 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-…☆14Dec 30, 2021Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Jun 12, 2016Updated 9 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Jun 4, 2019Updated 6 years ago
- Its a virus tool which destroys pc faster...☆15Sep 27, 2021Updated 4 years ago
- mobile version of my CIA hacking tool with nmap upgrades meant for termux and nethunter☆10Aug 17, 2020Updated 5 years ago
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Apr 17, 2021Updated 4 years ago
- Secrets detection based on regular expressions.☆22Apr 15, 2025Updated 11 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 3 months ago
- Crack md5 hash is a shell script used to decipher and crack MD5 hashes via a wordlist dictionary.☆15Jun 14, 2021Updated 4 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Open source alternative to Burpsuite☆16May 18, 2021Updated 4 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Detect firearm and nudity on Twitter and Instagram☆14Mar 27, 2019Updated 6 years ago
- ☆20Mar 11, 2026Updated last week