thejoshpit / electionBusterLinks
Scans the typos of candidate election pages for typosquatters
☆18Updated 7 years ago
Alternatives and similar repositories for electionBuster
Users that are interested in electionBuster are comparing it to the libraries listed below
Sorting:
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆24Updated 7 years ago
- Passive recon / OSINT automation script☆38Updated 7 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 9 years ago
- HoneyDB Python Module☆14Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Local Maltego Transforms for crt.sh☆12Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 5 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 8 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Spam trap management☆23Updated last year
- Leak File Analyzer☆62Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago