supdevinci / derrickLinks
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
☆31Updated 9 months ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- ☆55Updated last year
- Command Line Sock Puppet Creator for Investigators.☆82Updated 8 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 11 months ago
- NetProbe: Network Probe☆168Updated last year
- DPULSE - Tool for complex approach to domain OSINT☆155Updated this week
- Speed up your pentest enumeration☆83Updated 2 months ago
- All-sources tool to search websites by favicons☆177Updated last year
- A Linkedin Activity date Finder☆65Updated 7 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆146Updated 2 weeks ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 6 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆218Updated last month
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆159Updated 8 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆172Updated 3 months ago
- ☆56Updated 10 months ago
- ☆129Updated 5 months ago
- ☆317Updated last year
- A web based OSINT ressource and tool☆186Updated 7 months ago
- A OSINT project that explores how to dump data from React☆81Updated 2 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- 🕵️ Email osint tool☆63Updated 2 years ago
- Find CVEs associated to Linux and public exploits on github☆119Updated 7 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆327Updated 7 months ago
- Custom templates for OSINT investigations designed to advance pivoting.☆145Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆65Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- ☆44Updated 11 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 9 months ago