themalwarenews / SecHeadLinks
Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, users can quickly and easily identify any security vulnerabilities or weaknesses in the headers of a website, helping to ensure that the site is secure and protected against potential attacks.
☆12Updated 2 years ago
Alternatives and similar repositories for SecHead
Users that are interested in SecHead are comparing it to the libraries listed below
Sorting:
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- ☆42Updated 5 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- ☆12Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- ☆19Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆12Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆11Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago