rusty-ferris-club / reconLinks
π΅οΈββοΈ Find, locate, and query files for ops and security experts β‘οΈβ‘οΈβ‘οΈ
β36Updated 3 years ago
Alternatives and similar repositories for recon
Users that are interested in recon are comparing it to the libraries listed below
Sorting:
- WhiteBeam: Transparent endpoint securityβ101Updated 2 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.β18Updated last month
- NIST-based CVE lookup store and API powered by Rust.β136Updated 3 months ago
- A document tagging libraryβ32Updated 9 months ago
- Forensic framework to build tools that can be reused in multiple projects without changing anythingβ31Updated 2 months ago
- Automated attack surface mapper and vulnerability scanner (Work In Progress π§)β86Updated 4 years ago
- Signing-key abuse and update exploitation frameworkβ132Updated 7 months ago
- Carving tool based in Radare2 & Yaraβ17Updated 7 years ago
- Detect and remove the presence of canary tokensβ24Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscanβ90Updated 3 years ago
- clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerabilβ¦β98Updated 3 years ago
- An extension of the sigma standard to include security metrics.β15Updated 2 years ago
- Hundred Days of Yara Challengeβ12Updated 3 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.β227Updated 3 years ago
- Rust bindings to Microsoft Windows users / groups management APIβ34Updated this week
- python3 scripts to help with aws triage needsβ15Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP formatβ49Updated 2 years ago
- A forensic evidence acquirerβ86Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β79Updated 2 years ago
- ΞΌΞ΅ΟάμάΟΞΊΞ± - malevolent payload classifierβ23Updated 2 years ago
- reveal origins behind reverse proxies & hidden services π π§ π»β37Updated 4 months ago
- An experimental Velociraptor implementation using cloud infrastructureβ26Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)β16Updated 4 years ago
- Open YARA scan- and search engineβ25Updated 10 months ago
- Automated Persistence and Lateral Movement using GCP Patch Managementβ16Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systemsβ29Updated last year
- β16Updated 3 weeks ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTPβ33Updated last year
- Training scenarios for cyber rangesβ13Updated 5 years ago
- Timestomper and Timestamp checker with nanosecond accuracy for NTFS volumesβ52Updated 4 years ago