themalwarenews / SecHeadLinks
Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, users can quickly and easily identify any security vulnerabilities or weaknesses in the headers of a website, helping to ensure that the site is secure and protected against potential attacks.
☆13Updated 2 years ago
Alternatives and similar repositories for SecHead
Users that are interested in SecHead are comparing it to the libraries listed below
Sorting:
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Updated 3 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 3 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Web application pentesting recon☆23Updated 5 years ago
- ☆33Updated 8 months ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Ransomware groups posts☆42Updated this week
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago