supdevinci / derrickLinks
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
β31Updated 4 months ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- Command Line Sock Puppet Creator for Investigators.β81Updated 4 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated 7 months ago
- Speed up your pentest enumerationβ84Updated last week
- DPULSE - Tool for complex approach to domain OSINTβ145Updated 2 weeks ago
- NetProbe: Network Probeβ161Updated 9 months ago
- AI-Powered Dark Web OSINT Toolβ86Updated this week
- β55Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β52Updated 5 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β140Updated 4 months ago
- π΅οΈ Email osint toolβ62Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β123Updated last week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β138Updated 2 years ago
- Chrome Extensions for OSINTβ88Updated last month
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ21Updated 7 months ago
- A web based OSINT ressource and toolβ164Updated 3 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β51Updated 2 weeks ago
- All-sources tool to search websites by faviconsβ165Updated 8 months ago
- Discover and monitor internet assets using favicon hashes across search engines.β206Updated 6 months ago
- Identify the accounts most vulnerable to dictionary attacksβ121Updated 4 months ago
- π PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden connβ¦β282Updated 3 months ago
- β313Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.β64Updated last month
- β54Updated 6 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated 10 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ34Updated last year
- A Linkedin Activity date Finderβ51Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ122Updated 2 years ago
- Discovering Typo Squatting on your domains!β71Updated last year
- A curated list of tools and resources that I use daily as a Purple-Team operator.β82Updated 2 months ago
- β64Updated last year