supdevinci / derrickLinks
Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense professionals.
β29Updated 2 months ago
Alternatives and similar repositories for derrick
Users that are interested in derrick are comparing it to the libraries listed below
Sorting:
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated 5 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Managerβ20Updated 4 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated 8 months ago
- Command Line Sock Puppet Creator for Investigators.β77Updated 2 months ago
- AI-Powered Dark Web OSINT Toolβ71Updated last month
- Speed up your pentest enumerationβ84Updated 3 weeks ago
- β55Updated last year
- A Linkedin Activity date Finderβ48Updated last month
- Identify the accounts most vulnerable to dictionary attacksβ119Updated 2 months ago
- β53Updated 4 months ago
- π΅οΈ Email osint toolβ62Updated last year
- Powershell tools used for Red Team / Pentesting.β76Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β108Updated 2 months ago
- A web based OSINT ressource and toolβ112Updated last month
- β62Updated last year
- All-sources tool to search websites by faviconsβ145Updated 6 months ago
- β39Updated 5 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ37Updated last year
- πͺ XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSβ¦β51Updated 5 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β135Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β38Updated this week
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)β41Updated 3 months ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies Inβ¦β51Updated 3 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ33Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 8 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.β57Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β120Updated last year
- To perform OSINT on an instagram profileβ75Updated 9 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β138Updated 2 months ago
- Discovering Typo Squatting on your domains!β70Updated 10 months ago