supdevinci / derrickLinks
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
β31Updated 5 months ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- Command Line Sock Puppet Creator for Investigators.β81Updated 5 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated 8 months ago
- β55Updated last year
- DPULSE - Tool for complex approach to domain OSINTβ146Updated last month
- AI-Powered Dark Web OSINT Toolβ105Updated 3 weeks ago
- NetProbe: Network Probeβ163Updated 10 months ago
- Discover and monitor internet assets using favicon hashes across search engines.β209Updated 7 months ago
- Speed up your pentest enumerationβ83Updated 2 weeks ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β123Updated 3 weeks ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β151Updated 5 months ago
- All-sources tool to search websites by faviconsβ170Updated 9 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.β55Updated 3 weeks ago
- π΅οΈ Email osint toolβ62Updated 2 years ago
- A web based OSINT ressource and toolβ173Updated 4 months ago
- β54Updated 7 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.β68Updated 2 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β52Updated last month
- Identify the accounts most vulnerable to dictionary attacksβ122Updated 4 months ago
- A Linkedin Activity date Finderβ51Updated 4 months ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, emβ¦β105Updated 3 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ22Updated 7 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β52Updated 6 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ122Updated 2 years ago
- β314Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β138Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β122Updated 4 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.β86Updated 3 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated 10 months ago
- automated Open Source Intelligence gatheringβ123Updated 2 weeks ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analyβ¦β195Updated 11 months ago