themalwarenews / SecHeadLinks
Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, users can quickly and easily identify any security vulnerabilities or weaknesses in the headers of a website, helping to ensure that the site is secure and protected against potential attacks.
☆12Updated 2 years ago
Alternatives and similar repositories for SecHead
Users that are interested in SecHead are comparing it to the libraries listed below
Sorting:
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Automated tool for domains & Subdomains Gathering☆13Updated last year
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- This script is to build Wazuh 4.3 environment☆12Updated 3 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 3 weeks ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- ☆20Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆18Updated 4 months ago