shivankar-madaan / TorBoT
Deep and Dark Web OSINT Tool
☆9Updated 6 years ago
Alternatives and similar repositories for TorBoT
Users that are interested in TorBoT are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- recon-ng modules for Censys☆37Updated last year
- ☆33Updated 3 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆60Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 5 months ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆59Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆18Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- URL fingerprinting made easy☆86Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- Technical Tabletop Exercises Simulation Framework☆47Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 3 months ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated 11 months ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- ☆42Updated last month
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago