supdevinci / derrickLinks
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
β31Updated 9 months ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated last year
- β55Updated last year
- Speed up your pentest enumerationβ83Updated 2 months ago
- Command Line Sock Puppet Creator for Investigators.β83Updated 9 months ago
- π΅οΈ Email osint toolβ63Updated 2 years ago
- NetProbe: Network Probeβ171Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.β220Updated 2 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β161Updated 9 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β140Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β55Updated 10 months ago
- DPULSE - Tool for complex approach to domain OSINTβ155Updated last week
- β65Updated last year
- β56Updated 11 months ago
- β317Updated last year
- A OSINT project that explores how to dump data from Reactβ81Updated 3 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.β67Updated 4 months ago
- Identify the accounts most vulnerable to dictionary attacksβ121Updated 8 months ago
- A Linkedin Activity date Finderβ64Updated 8 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.β92Updated 7 months ago
- All-sources tool to search websites by faviconsβ181Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β129Updated 9 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated last year
- A web based OSINT ressource and toolβ185Updated 8 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ123Updated 2 years ago
- β133Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ34Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β64Updated 5 months ago
- Garudaastra Tool is based on python3 to find cameras around the worldβ27Updated 2 years ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β152Updated last month
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ23Updated 11 months ago