Low-Impact Fingerprint Tool
☆59Sep 25, 2025Updated 7 months ago
Alternatives and similar repositories for lift
Users that are interested in lift are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 5 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated 3 months ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Aug 28, 2015Updated 10 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Dec 21, 2023Updated 2 years ago
- Full Packet Capture for the Masses☆14Sep 13, 2018Updated 7 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 6 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 11 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆24Apr 11, 2018Updated 8 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆10Jan 29, 2025Updated last year
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆17Aug 15, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 9 years ago
- Open Source Telnet Honeypot☆108Mar 20, 2017Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- ☆25Aug 25, 2015Updated 10 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- ☆18May 3, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes☆16Feb 7, 2024Updated 2 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20Apr 8, 2026Updated 3 weeks ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- A collection of infosec related scripts and information.☆54Oct 2, 2024Updated last year
- ☆29Nov 10, 2016Updated 9 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago