supdevinci / derrick
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
☆25Updated 3 weeks ago
Alternatives and similar repositories for derrick:
Users that are interested in derrick are comparing it to the libraries listed below
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 2 months ago
- Intelligence Blocklists: Phishing, Scam Domains☆23Updated this week
- Speed up your pentest enumeration☆83Updated last week
- Command Line Sock Puppet Creator for Investigators.☆69Updated this week
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- ☆52Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 5 months ago
- ☆55Updated 10 months ago
- Identify the accounts most vulnerable to dictionary attacks☆118Updated 7 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last month
- A web based OSINT ressource and tool☆77Updated 2 weeks ago
- ☆61Updated 10 months ago
- NetProbe: Network Probe☆156Updated 5 months ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆40Updated last month
- 🕵️ Email osint tool☆62Updated last year
- DPULSE - Tool for complex approach to domain OSINT☆106Updated this week
- This is an AD pentest tools collection☆57Updated 8 months ago
- ☆38Updated 3 months ago
- All-sources tool to search websites by favicons☆120Updated 4 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆53Updated 4 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆29Updated 9 months ago
- ☆26Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆119Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- GLPI vulnerabilities checking tool☆53Updated last week
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆49Updated last month
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- Discovering Typo Squatting on your domains!☆67Updated 7 months ago