trickest / insiders
Archive of Potential Insider Threats
β143Updated last year
Alternatives and similar repositories for insiders:
Users that are interested in insiders are comparing it to the libraries listed below
- A simple tool that helps to find assets/domains based on the Google Analytics ID.β173Updated last month
- π Collection of regexp pattern for security passive scanningβ115Updated 2 years ago
- Filter and enrich a list of subdomains by levelβ198Updated last year
- A quick βn dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.β125Updated 7 months ago
- A projectdiscovery driven attack surface monitoring bot powered by axiomβ181Updated 2 years ago
- Execute Trickest workflows right from your terminalβ87Updated last month
- Community Workflow for the Osmedeus Engine that describes basic reconnaissance methodology for you to build your ownβ70Updated 10 months ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.β127Updated 2 years ago
- Get related domains / subdomains by looking at Google Analytics IDsβ242Updated 2 years ago
- Sample Obsidian's vault for web pentestingβ96Updated 6 months ago
- Make URL path combinations using a wordlistβ173Updated last year
- List all public repositories for (valid) GitHub usernamesβ68Updated last year
- Monitoring the Cloud Landscapeβ78Updated 2 months ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.ioβ126Updated 2 years ago
- Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.β201Updated this week
- My useful files for penetration tests, security assessments, bug bounty and other security related stuffβ156Updated this week
- Generate tens of thousands of subdomain combinations in a matter of secondsβ258Updated last year
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty reconβ234Updated last year
- Real world bug bounty wordlistsβ112Updated last year
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.β111Updated 3 years ago
- Distribute ordinary bash commands over many systemsβ161Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β119Updated 2 years ago
- goverview - Get an overview of the list of URLsβ142Updated last year
- Community curated list of search queries for various products across multiple search engines.β163Updated this week
- Build your own reconnaissance system with Osmedeus Next Generationβ183Updated 2 weeks ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.β175Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHubβ49Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built usingβ¦β149Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.β229Updated last year
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.β57Updated 2 years ago