Low-Impact Fingerprint Tool
☆59Sep 25, 2025Updated 5 months ago
Alternatives and similar repositories for lift
Users that are interested in lift are comparing it to the libraries listed below
Sorting:
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- ☆10Jan 29, 2025Updated last year
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- ☆29Nov 10, 2016Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- The Authentic Software Guard☆13Dec 20, 2015Updated 10 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- A Docker based Honey Pot☆17Oct 3, 2018Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆17Sep 22, 2016Updated 9 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Apr 19, 2024Updated last year
- ☆24Feb 25, 2026Updated last week
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- ☆18May 3, 2016Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Application and Service Fingerprinting☆134Dec 8, 2022Updated 3 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 8 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- Random IP Dialer for your subnet and SOCKS Proxy☆24Sep 1, 2025Updated 6 months ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆24Oct 1, 2023Updated 2 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Apr 11, 2018Updated 7 years ago