supdevinci / derrick
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
β28Updated last month
Alternatives and similar repositories for derrick:
Users that are interested in derrick are comparing it to the libraries listed below
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ19Updated 3 months ago
- β55Updated 11 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated 3 months ago
- β52Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated 6 months ago
- Command Line Sock Puppet Creator for Investigators.β72Updated 3 weeks ago
- Intelligence Blocklists: Phishing, Scam Domainsβ25Updated this week
- β60Updated 11 months ago
- π΅οΈ Email osint toolβ62Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β133Updated last year
- Speed up your pentest enumerationβ83Updated last month
- Identify the accounts most vulnerable to dictionary attacksβ119Updated 2 weeks ago
- Track C2 servers, tools, and botnets over time by framework and locationβ37Updated 2 months ago
- Discovering Typo Squatting on your domains!β68Updated 8 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ35Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 7 months ago
- β38Updated 3 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β120Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ32Updated 10 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β49Updated 2 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.β57Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.β76Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)β41Updated last month
- A web based OSINT ressource and toolβ100Updated last week
- A Linkedin Activity date Finderβ43Updated last week
- To perform OSINT on an instagram profileβ72Updated 8 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β133Updated last month
- Regular Expressions List used in Digital Forensic Tasksβ83Updated last month
- NetProbe: Network Probeβ155Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ120Updated last year