sethhall / credit-card-exposureLinks
Detect credit card exposures with Bro
☆15Updated 2 years ago
Alternatives and similar repositories for credit-card-exposure
Users that are interested in credit-card-exposure are comparing it to the libraries listed below
Sorting:
- Searches various online resources to try and get as much info about an IP/domain as possible.☆99Updated 11 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Twintelligence is a free Twitter OSINT tool☆52Updated 4 years ago
- Maltego Local Transforms for Facebook☆76Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆87Updated 6 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 7 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126Updated 7 years ago
- Get detailed information about a Twitter user activity☆101Updated 10 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆66Updated 7 years ago
- A Web Application to Send and Track Spear Phishing Campaigns☆104Updated 8 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Bro-IDS scripts☆50Updated 9 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Sensor software☆68Updated 4 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Fun with Amazon AWS and Maltego☆30Updated 8 years ago
- Botnet command & control monitor☆198Updated 3 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Find phishing kits which use your brand/organization's files and image.☆241Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago