triw0lf / urlscan_scriptsLinks
A bunch of scripts I use to work with urlscan.io
☆34Updated 5 years ago
Alternatives and similar repositories for urlscan_scripts
Users that are interested in urlscan_scripts are comparing it to the libraries listed below
Sorting:
- SMTP server / sinkhole for collecting spam☆44Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- ☆52Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- ☆54Updated 4 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- ☆53Updated 7 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- A collection of infosec related scripts and information.☆53Updated 10 months ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Digital Preservation Software (National Archives of Australia)☆37Updated 14 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago