urlscan / urlscan-cliLinks
Official urlscan.io and urlscan Pro CLI tool
☆31Updated this week
Alternatives and similar repositories for urlscan-cli
Users that are interested in urlscan-cli are comparing it to the libraries listed below
Sorting:
- A repository of credential stealer formats☆242Updated 7 months ago
- A collection of methods to learn who the owner of an IP address is.☆224Updated 4 months ago
- Tor onion address lookup☆59Updated last month
- IOCs collected during day-to-day activities☆104Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 7 months ago
- Knowledge base on cybercriminal concealment techniques☆92Updated 9 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆223Updated 3 months ago
- A tool for mapping cyber crime☆236Updated 2 weeks ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆146Updated this week
- IOCs and notes related to malware☆26Updated 7 months ago
- ☆144Updated 8 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- A meta-list of public references to threat actor profiles and APT group datasets.☆74Updated 4 months ago
- All-sources tool to search websites by favicons☆184Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆93Updated 11 months ago
- All the deals for InfoSec related software/tools this Black Friday☆262Updated 2 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 10 months ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- FT3: Fraud Tools, Tactics, and Techniques Framework☆100Updated 6 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆389Updated last week
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆77Updated this week
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆48Updated 3 weeks ago